Differentiate between hackers, crackers, and ethical hackers.
[3 marks]Explain security fundamentals.
[4 marks]Describe the phases of an ethical hacking process.
[7 marks]What is footprinting? Explain active and passive footprinting with examples.
[3 marks]Explain different scanning techniques used in network reconnaissance.
[4 marks]Demostrate the information gathering tool Maltego in detail.
[7 marks]Demonstrate how OS fingerprinting is performed using tools like Nmap.
Define enumeration and list various enumeration techniques.
[3 marks]Explain the attacker’s methodology in information gathering.
[4 marks]Explain DoS and DDoS attacks with examples.
[7 marks]What is vulnerability assessment? Explain risk mitigation in vulnerability assessment.
[3 marks]Explain the steps involved in penetration testing.
[4 marks]Analyze a real-world case study of penetration testing and identify key findings.
[7 marks]Explain the importance of risk mitigation in penetration testing.
[3 marks]Define malware and classify different types.
[4 marks]Explain the working of keyloggers and spyware in detail.
[7 marks]Explain SQL Injection and Cross-Site Scripting (XSS) with examples.
[3 marks]Discuss the techniques used in web server and application attacks.
[4 marks]Evaluate the impact of malware threats and suggest preventive measures.
[7 marks]What is an Intrusion Detection System (IDS)? Page 1 of
[2 marks]Explain types of firewalls with examples.
[4 marks]Describe the role and working of honeypots in network security.
[7 marks]Explain two vulnerabilities of WLANs.
[3 marks]Explain web session hijacking.
[4 marks]Elaborate session hijacking Process in detail. Page 2 of
[2 marks]