Professional Documents
Culture Documents
Cia Ii Ita14 Ethical Hacking Desceptive Questions
Cia Ii Ita14 Ethical Hacking Desceptive Questions
1. Web Applications are characterized by rapid development time and very short turnaround
time. In this scenario it is very difficult to curb the vulnerabilities in those applications.
Provide an analytical report on various frameworks available for vulnerability scanning
of those applications along with methods to test the web application. Your report should
contain a tabular approach to any four frameworks with emphasis on their components
involved. (10 marks)
2. NFS in linux boxes play a vital role in file management. These NFS configuration files in
linux needs different configuration parameters to be set properly in order to eliminate
hacking based operations. List those steps involved in the proper configuration of NFS.
Also, with the help of a neat diagram on architectural component, specify how a client
and server can communicate over NFS methodology without compromising on security
with the help of RPC (10 marks)
3. WiFi localization databases pose lot of challenges in securing wireless networks. Provide
an extensive discussion on how these GPS coordinates in localization databases helps
hackers to crack and obtain information from various wireless networks. (10 marks)
4. Provide a comparative study on buffer overflow, heap overflow and integer overflow
from the perspectives of secure coding to prevent intrusion (5 marks)