You are on page 1of 6

Even Semester Examination June, 2023 Review Date:

Faculty of Computer Technology Semester: 4 (Even)


Session:
Programme: BCA CTIS Maximum Marks: 60
Max Time: 2 Hours
Course Name: Ethical Hacking Fundamentals
Course Code: BCA402
Note: (if any)
COs: (Need to be defined from the syllabus) The faculty may define any number of CO in the
syllabus
CO1: The scope of ethical hacking in the Information Security domain and Footprinting
CO2: Explain the concept of enumeration and the techniques used for Windows enumeration
CO3: Understand sniffing, session hijacking and Man in the middle attack
CO4: List the security breaches through vulnerability assessment and ways to improve them
CO5: Explain how vulnerabilities are mitigated using various tools and techniques

Question No. Questions Marks Unit No. CO BL

Section 1 (MCQs) [20 Nos.]


1a Black box testing, White box testing and Grey box
testing are the three types of Security testing. Among
1
this, Grey box testing is also called as 1 CO1 L1
______________ a) Penetration testing b) Hybrid
testing c) Reconnaissance d) None of the above
1b Assume that a company ‘Trigent Information 1
Systems’ has decided to employ a team of ethical
hackers to investigate their security protocols CO1
concerning the development of a new product. What 1 L2
is the ideal penetration testing type in this situation?
a) Black box testing b) White Box testing c) Grey box
testing d) Hybrid testing
CO1
1c A person who gains access to information via
communication systems such as credit card
1 1 L1
information, attack PBXs or is able to make calls free
of cost illegally, is called a/an a) Hacker b) Ethical
hacker c) Whacker d) Phreaker
1d A nation is said to be under _______________if there 1
has been a major attack on the infrastructure of a CO1 L2
nation such as on financial centres, transport hubs or
power plants. a) Threat b) A virus attack c) Cyber 1
terrorism d) Hacktivism
1e What is the definition of Steganography a) Attacking 1
computer systems with an intention to weaken the
economic or military strength of a nation. b) The
practice of concealing messages or information within L1
other non-secret text or data. c) Operating in a double CO1
blind environment to ethically hack into an 1
organization. d) The study of technology and the tools
required to be an expert ethical hacker
1f Nmap and Nessus are examples of _____________. 1
a) Security scanning tools b) Worms c) Malware d) CO1 L2
Sniffers 1
1g What is the correct form of SNMP a) Simple Network 1
Management Process b) Simple Network
Manipulation Process c) Simple Network 2
Management Protocol d) Simple NetBIOS CO2 L2
management Protocol
1h Pick the answer that does not belong to this set and
state your reasons: a) Querying DNS b) Enumerating
1 2
SNMP c) Executing Whois command d) Retrieving CO2 L1
information from Active Directory
1i The default value of the SNMP Community String for 1
all devices is a) Zero b) One c) Null d) Public 2 CO2 L2
1j Which of the answers below is not a tool used for
SNMP enumeration a) IP Network Browser b) SNMP
1 L1
Informant c) Getif d) None of the above 2 CO2
1k Which of the answers below are used as a
countermeasure act for SNMP vulnerability? a)
1
Disabling access to ports TCP 139 or TCP 445 b)
Turning off SNMP Service c) Restricting access to 2 CO2 L1
null sessions d) Both b and c
1l Continued state of exchange of ACK packets at high 1
rate, that may suspend the communication on the
network, is called as _______________. a) Denial of
Service attack b) Spoofing c) ACK Storm d) Blind 3 CO3 L2
session hijacking
1m In Session hijacking, if the attacker fails to guess the 1
Sequence number precisely using Spoofing, he is left
with the option to guess the Sequence numbers,
which is called a) Blind session hijacking b) Passive CO3 L3
session hijacking c) Active Session hijacking d) None 3
of these
1n What kind of attack is infected upon computers or
Information Systems when the attacker exploits the
1
weakness in the protocol design rules? a) Session
hijacking b) Masquerading c) Denial of Service d) 3 CO3 L1
None of these
1o In which of the below DoS attack type, attacker 1
exploits the weakness in UDP, TCP or ICMP? a)
Logic DoS attack d) Protocol DoS attack c) 3 CO3 L2
Bandwidth consumption d) Compromising physical
network components
1p Which among the following options is an active
sniffing method? a) ARP spoofing b) MAC flooding
1 3
c) Both a. and b. d) Password sniffing CO3 L1

1q A well-known system integrity verifier is? a) Log file 1


monitor b) Tripwire c) Nmap d) None of the above 4 CO4 L2

1r An example of an IDS evasion tool that injects


overlapping packet segments in a random order in the
1 4 CO4 L3
form of attack signatures is known as. a) Stick b)
Mendax c) Fragroute d) Nmap
1s “Vanilla” and “distribution kernel” are two types of a) 1
Drivers b) Windows Operating systems c) Kernels d)
4 CO4 L3
Configuration programs
1t Which of the following is the correct command for
installing kernel modules? a) Make modules_install
1
L1
b) Make modules_new c) Make modules_clean d)
CO4
Make modules_rem
4

Section 2 (2 Marks Questions) [5 Nos.]


2a What are the types of ethical hackers? 2 1 CO1 L2
2b Explain Network Sniffing? 2
2 CO2 L1
2c Explain Keylogger Trojan? 2 2
2 CO2 L2
2d Explain Ethical Hacking? 2
2e Define Enumeration. 2 1 CO2 L1
CO1 L3
1
CO1 L2

Section 3 (4 Marks Questions) [5 Nos. out of 7 questions]


3a Explain Session Hijacking with proper example 4 3 CO3 L3
3b What is Phishing Attack? Explain with example. 4 2 CO2 L2
3c Explain the Brute Force Attack. 4
2 CO2 L3
3d Explain how you can stop your website getting 4
hacked? 2 CO2 L2
3e List various components of the IDS, with their 4 3
functions CO3 L1
3f What is difference between Virus and Worm? 4 3 CO3 L2
3g Explain the three-way handshake method of a TCP 4 2 CO2 L1
communication process.
Section 4 (10 Marks Questions) [1 Nos. out of 2 questions]
Define the Penetration Testing 2 CO1 L5
4a 10

4b What are the five steps in the process of malicious 3 CO3 L6


hacking? Explain them briefly 10

Marks Distribution

BL6
13% BL1
23%
BL5
13%

BL4 BL2
15% 19%

BL3
17%

BL1 BL2 BL3 BL4 BL5 BL6


MARKS
20
18
16
14
12
10
8
6
4
2
0
Marks Dis- CO1 CO2 CO3 CO4 CO5
tribution
Black box testing, White box testing and Grey box
testing are the three types of Security testing. Among
this, Grey box testing is also called as
______________ a) Penetration testing b) Hybrid
testing c) Reconnaissance d) None of the above
Ans: b
Assume that a company ‘Trigent Information
Systems’ has decided to employ a team of ethical
hackers to investigate their security protocols
concerning the development of a new product. What
is the ideal penetration testing type in this situation?
a) Black box testing b) White Box testing c) Grey box
testing d) Hybrid testing.
Ans: a
A person who gains access to information via
communication systems such as credit card
information, attack PBXs or is able to make calls free
of cost illegally, is called a/an a) Hacker b) Ethical
hacker c) Whacker d) Phreaker
Ans: d
A nation is said to be under _______________if there
has been a major attack on the infrastructure of a
nation such as on financial centres, transport hubs or
power plants. a) Threat b) A virus attack c) Cyber
terrorism d) Hacktivism
Ans: c
What is the definition of Steganography a) Attacking
computer systems with an intention to weaken the
economic or military strength of a nation. b) The
practice of concealing messages or information within
other non-secret text or data. c) Operating in a double
blind environment to ethically hack into an
organization. d) The study of technology and the tools
required to be an expert ethical hacker.
Ans: b
Nmap and Nessus are examples of _____________.
a) Security scanning tools b) Worms c) Malware d)
Sniffers.
Ans: a
What is the correct form of SNMP a) Simple Network
Management Process b) Simple Network
Manipulation Process c) Simple Network
Management Protocol d) Simple NetBIOS
management Protocol
Ans:c
Pick the answer that does not belong to this set and
state your reasons: a) Querying DNS b) Enumerating
SNMP c) Executing Whois command d) Retrieving
information from Active Directory
Ans:c
The default value of the SNMP Community String for
all devices is a) Zero b) One c) Null d) Public
Ans:d
Which of the answers below is not a tool used for
SNMP enumeration a) IP Network Browser b) SNMP
Informant c) Getif d) None of the above
Ans:d
Which of the answers below are used as a
countermeasure act for SNMP vulnerability? a)
Disabling access to ports TCP 139 or TCP 445 b)
Turning off SNMP Service c) Restricting access to
null sessions d) Both b and c
Ans: d
Continued state of exchange of ACK packets at high
rate, that may suspend the communication on the
network, is called as _______________. a) Denial of
Service attack b) Spoofing c) ACK Storm d) Blind
session hijacking.
Ans:a
In Session hijacking, if the attacker fails to guess the
Sequence number precisely using Spoofing, he is left
with the option to guess the Sequence numbers, which
is called a) Blind session hijacking b) Passive session
hijacking c) Active Session hijacking d) None of
these
What kind of attack is infected upon computers or
Information Systems when the attacker exploits the
weakness in the protocol design rules? a) Session
hijacking b) Masquerading c) Denial of Service d)
None of these.
Ans: a
In which of the below DoS attack type, attacker
exploits the weakness in UDP, TCP or ICMP? a)
Logic DoS attack d) Protocol DoS attack c)
Bandwidth consumption d) Compromising physical
network components.
Ans:d
Which among the following options is an active
sniffing method? a) ARP spoofing b) MAC flooding
c) Both a. and b. d) Password sniffing.
Ans: c
A well-known system integrity verifier is? a) Log file
monitor b) Tripwire c) Nmap d) None of the above
Ans:b
An example of an IDS evasion tool that injects
overlapping packet segments in a random order in the
form of attack signatures is known as. a) Stick b)
Mendax c) Fragroute d) Nmap
Ans: b
“Vanilla” and “distribution kernel” are two types of a)
Drivers b) Windows Operating systems c) Kernels d)
Configuration programs.
Ans:c
Which of the following is the correct command for
installing kernel modules? a) Make modules_install b)
Make modules_new c) Make modules_clean d) Make
modules_rem.
Ans:a

You might also like