How to express Vulnerability? Give small example.
[3 marks]Explain the significance of Nmap? Explain different functionality with its command in detail.
[4 marks]Explain Following terms: 1. Traffic Probe 2. Banner / Version Check 3. Hping 4. Datapipe 5. Network Reconnaissance 6. WinRelay 7. Fpipe
[7 marks]Compare Stateless Vs Stateful Firewalls.
[3 marks]Explain the practical important of Tcpdump and Windump with example.
[4 marks]Why port forwarding is required? Describe port forwarding with its types in detail.
[7 marks]Describe Debit card fraud that can be done through mobile or other wireless devices.
[7 marks]Explain the purpose of IDS and IPS with architecture.
[3 marks]What can you say about Curl, OpenSSL, Stunnel and Zed Attack Proxy?
[4 marks]What problems can occur to use John the Ripper, L0htcrack and Pwdump? How they can be solved?
[7 marks]1.What is the name of the website where you can download 0 the Kali Linux ISO file?
[3 marks]kali.org b) kali.com c) kali.net d) kali.io 2.What are the two options for starting the installation of Kali Linux from the boot screen?
[ marks]Graphical install or Install (Text-Mode) b) Live install or Install (Command-Line)
[ marks]Standard install or Install (Advanced) d) Basic install or Install (Custom) 3.What do you mean by nmap -open 192.168.1.1?
[ marks]Describe the aim and objective of Indian IT ACT 2000.
[3 marks]How can you implement Digital Forensics?Expain with example.
[4 marks]Write a short note on Hacking, Attack vectors, Cyberspace and Criminal Behavior.
[7 marks]What do you mean by Netcat? Explain Following terms. 1.nc -v l p 1200 2. nc -v l p 1200 < file.txt 3.nc www.gtu.ac.in 80
[3 marks]Define the Cyber Crime in your own word. Explain the different type of classification of Cyber Crime.
[4 marks]What do you mean by Network Address Translation and Kismet?Explain with poper example.
[7 marks]How can you implement SQL injection ? Explain clearly with example.
[3 marks]What can you say about Incident Response. Explain it process flow with appropriate diagram.
[4 marks](i) Explain different attacks on wireless network. (ii)Which tools are used for password cracking?
[7 marks]Compare Software keyloggers and Hardware keyloggers.
[3 marks]What do you mean by Steganography?Explain with example.
[4 marks](i) How can we prevent DDOS attack? (ii)How Buffer overflow attack works?
[7 marks]Explain the web vulnerability tools like Nikto and W3af.
[4 marks]Can you explain what is happening in Wireshark and how do we use Wireshark to find a password in network?
[7 marks]