NPTEL Ethical Hacking Assignment Solution 2023
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 3 Ethical Hacking](https://gecmunger.in/wp-content/uploads/2023/07/Ethical-Hacking-1024x576.png)
NPTEL Ethical Hacking Week 12 Assignment Answers 2023
Q1. Which of the following options can be used for host discovery using NMAP?
a. -PE
b. -PC
C. -PM
d. -PP
Answer:- a, c, d
Q2. Which of the following packets will be received in response form a target if an attacker sends out an ICMP ECHO request (Type 8) packet (Assume that the target is live).
a. ICMP Echo Request (Type 8)
b. ICMP Echo Reply (Type 0)
c. ICMP Timestamp reply (Type 14)
d. ICMP Address mask reply (Type 18)
Answer:- b
Q3. In TCP sweep scan, a scanner sends a “S* packet (Synchronization) and receives a “RA” packet (Reset) from target. What does it indicates?
a. Target is alive/up.
b. Target is down.
[ihc-hide-content ihc_mb_type=”show” ihc_mb_who=”1,2,3″ ihc_mb_template=”1″ ]
Answer:- a
Q4. To see why NMAP is reporting any port as open or close (or a host as up or down) which of the following options is used?
a. ~-disable-arp-ping
b. -packet-trace
c. –show-reason
d. -reason
Answer:- d
Q5. Which of the following scanning options uses all type of sweep operations (except UDP sweep)?
a. -SIl
b. -PE
c. _PP
d. None of these
Answer:- a
Q6. Which of the following NMAP scans completes 3-way handshake?
a. ICMP Echo Sweep Scan
b. ICMP Non-Echo Sweep Scan
c. TCP Connect Scan
d. TCP Stealth Scan
Answer:- c
Q7. In NMAP, _________ number of ports are scanned when we use -F option.
Answer:- 100
Q8. Which of the following NMAP option is used for OS detection?
a. -sL
b. -sP
c. -PO
d. -sU
e. None of these.
Answer:- e
Q9. Which of the following protocols are vulnerable to sniffing attack?
a. HTTP
b. HTTPS
c. SSL
d. SSH
e. FIP
Answer:- a, e
Q10. Which of the following statements) is/are true for promiscuous mode?
a. While running network analyzer tool such as sniffer, it is necessary to enable promiscuous mode.
b. In promiscuous mode the sniffer can read all traffic on the network segment to which the NIC is connected.
c. We do not require root privilege to set the NIC to promiscuous mode.
d. All of these.
Answer:- a, b
[/ihc-hide-content]
NPTEL Ethical Hacking Week 11 Assignment Answers 2023
Q1. Which of the following is used to take advantage of system/application bugs?
a. Exploit
b. Payload
с. Auxiliary
d. Encoder
e. msfvenum
Answer:- a
Q2. Which of the following statement is true for meterpreter payload?
a. Meterpreter payload is used to perform brute force attack.
b. Meterpreter payload provides an interactive shell to the attacker from which attacker can explore the target machine and can execute codes.
c. Meterpreter payload is used to launch Metasploit framework.
d. Meterpreter payload is used to bypass the anti-virus installed in target system.
е. None of these.
Answer:- b
Q3. Which of the following module is used to create new payloads.
a. Msfconsol
b. Encoders
c. Exploit
d. None of these
Answer:- d
Q4. In Metasploit, to check various parameters that need to be set for an exploit, which of the following commands is used?
a. Show parameters
b. Show options
c. Set parameters
d. Set options
e. None of these
Answer:- b
Q5. To create a payload (backdoor), which of the following is required?
a. Name of the payload
b. IP of the target system
c. IP of an attacker system
d. Port of target system
e. Port of an attacker system.
Answer:- a, c, e
Q6. Which of the following tools/approach can be used to extract existing and hidden pages of a webserver?
a. Dirb
b. NMAP scan using “http-enum” script
c. Hydra
d. Crunch
Answer:- a, b
Q7.
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 4 image 51](https://gecmunger.in/wp-content/uploads/2023/10/image-51.png)
Answer:- d
Q8.
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 5 image 52](https://gecmunger.in/wp-content/uploads/2023/10/image-52.png)
Answer:- b, c
Q9.
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 6 image 49](https://gecmunger.in/wp-content/uploads/2023/10/image-49.png)
Answer:- c
Q10.
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 7 image 50](https://gecmunger.in/wp-content/uploads/2023/10/image-50.png)
Answer:- b
NPTEL Ethical Hacking Week 10 Assignment Answers 2023
1. Which of the following are examples of hardware-based attacks?
a. Side-channel attack.
b. Physical probing.
c. Denial of service stack.
d. SOL injection attack
Answer :- a, b
2. For modular exponentiation computation of x25, how many squaring and multiplication operations would be required?
a. 4 and 4.
b. 4 and 2.
c. 3 and 4.
d. 5 and 2.
e. 5 and 3.
Answer :- b
3. Which of the following is/are true for side-channel attacks?
a. They exploit weakness in cryptographic algorithm.
b. They exploit weakness in algorithm implementation.
c. They do not require physical access to the device.
d. It is used to encrypted ciphertexts for a number of given plaintext messages.
Answer :- b
4.
Answer :- a, b
5. Which of the following strategies can be used to prevent timing analysis attack?
a. Make the computation independent of the input.
b. Package the chip in a temper proof casing.
c. Use highly secured cryptographic algorithm.
d. None of these.
Answer :- a
6. Which of the following is not a desirable property of PUF?
a. Given a PUF, it is hard to construct a procedure PUF’, where PUF != PUF’, and PUF’ (x) = PUF(x) for all x.
b. Given only y and corresponding PUF instance, it is hard to find x such that PUF(x) =У.
C. Given PUF and x, it should be easy to evaluate y = PUF(x)
d. None of these.
Answer :- d
7. PUF can be used for:
a. Security Primitive
b. Identification
c. Private Public key pair generation.
d. None of these.
Answer :- a, b, c
8. Number of possible paths in 8-bit arbiter PUF will be_____
Answer :- 256
9. Consider the following statements:
(a) Hardware Trojans are small modifications in the circuit.
(ii) It is used to reduce power consumption of a circuit.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (1) and (11) are true.
Answer :- a
10. Which of the following statements) is/are true about Hardware Trojan?
a. It performs tasks for which it are designed or programmed.
b. It can replicate itself.
c. It does nothing harmful to the user’s computer system.
d. None of these.
Answer :- a
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL Ethical Hacking Week 9 Assignment Answers 2023
1. In promiscuous mode, a network device, such as an adapter on a host system, can intercept and read all traffic on the network segment to which the adapter is connected.
a. True
b. False
Answer :- a
2. Which of the following commands can be used to put the NIC of a machine to promiscuous mode? (Assumption: Machine IP – 192.168.43.48, IP of default gateway – 192.168.43.141, the machine is connected with ethO interface).
a. arpspoof 192.168.43.48
b. arpspoof 192.168.43.141
c. arpspoof-i eth0 192.168.43.48
d. arpspoof-i eth0 192.168.43.141
Answer :- d
3. In Wireshark, to filter all the packets used by an IP address 23.36.4.106, which of the following filter option/command can be used?
a. 23.36.4.106
b. ip == 23.36.4.106
c. ip.addr == 23.36.4.106
d. ip.address = 23.36.4.106
e.
None of these.
Answer :- c
4. A simple packet analyzer tool such as Wireshark can capture login credential of a user if the login page is using the following Protocol:
а. НТТР
b. SSH
c. HTTPS
d. SSL
e. None of these.
Answer :- a
5. How to detect whether network sniffing is probably going on in a network?
a. By checking the ARP entry.
b. By conducting TCP stealth scan on all the machines in the network.
c. By using a script that checks whether any of the machines has the network
card configured in the promiscuous mode.
d. None of these.
Answer :- a, c
6. What is the purpose of scanner module available in burp suite?
a. It is used to mount password attack.
b. It is used for manipulating and reissuing packets and to analyze their response.
c. It is used for creating dictionary.
d. It is used for automotive crawling web applications.
e. None of these.
Answer :- e
7. In Burp suite which of the following module is used to intercept, inspect and modify raw traffic?
a. Spider
b. Scanner
c. Intruder
d. Proxy
e. None of these.
Answer :- d
8. Which of the following is/are example(s) of computer-based social engineering attack?
a. Impersonation
b. Tailgating
c. Shoulder surfing
d. Chain letters
e. phishing
Answer :- d, e
9. How does Slowloris attack work?
a. It sends a single large ping packet to victim system.
b. It sends multiple HTTP requests to the victim system but never completes the request.
c. It sends large number ARP packet to the victim system.
d. None of these.
Answer :- b
10. Which of the following tools can be used to mount DoS attack?
a. LOIC tool.
b. Hping3.
c. Hydra.
d. Crunch.
e. None of these.
Answer :- a, b
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL Ethical Hacking Week 8 Assignment Answers 2023
1. Consider the following statements:
(1) Steganography refers to a set of methods to hide some secrete information in an audio/image/executable files.
(il) Steganography and digital watermarking shares same operational and functional behaviors.
a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true
d. Both (i) and (ii are false.
Answer :- c
2. Consider a gray-level image of size 2000 x 2000, where each pixel is stored in 24-bits
(containing red, green, and blue components as 8-bit each. How many bytes of information can
be hidden in the image by using LSB steganography technique? (Assume that only the least
significant bit in each 8-bit color component is modified).
Answer :- 1500000
3. Which of the following statement(s) is/are true?
a. Biometrics refers to an automated method for hiding information in a media like audio, video, image etc.
b. Biometrics refers to embedding copyright, ownership, license and similar information in a medium such as audio, video, image etc.
с. Biometrics refers to an automated method for recognizing individuals based on measurable biological and behavioral characteristics.
d. None of these.
Answer :- c
4. Which of the following is/are examples) of behaviour biometric?
a. Retina scan
b. Fingerprint recognition
c. Facial recognition
d. None of these
Answer :- d
5. Which of the following statements) is/are true in biometric systems?
a. For authentication application, a user template is compared against all possible templates stored in the database.
b. For verification application, a user template is compared against a specific single template stored in the database.
c. Biometric systems can provide 100% accuracy in security applications.
d. None of these.
Answer :- d
6. Which of the following attacks rely on the accumulation of TCP half-open connections on the server?
a. Ping of death attack.
b. SYN flooding attack.
c. Smurf attack.
d. None of these.
Answer :- b
7. In which of the following denial-of-service attacks, the attacker attempts to crash/freeze target computer/service by sending oversized packet in simple ping command?
a. SYN flooding attack.
b. Smurf attack.
c. Ping-of-death.
d. None of these.
Answer :- c
8. Which of the following statements) is/are true for HTTP Flood attack?
a. It is a type of Distributed-Denial-of-Service (DDoS) attack.
b. It overwhelms a target server by accumulating large number of TCP half-open connections.
c. It overwhelms a target server using oversized ping packets.
d. It overwhelms a target server with HTTP request.
e. None of these.
Answer :- a, d
9. Which of the following approach can be used to mitigate HTTP flood attack?
a. Use captcha test.
b. Use JavaScript computational challenge.
c. Use web application firewall.
d. Block ping requests.
e. Block TCP connections.
f. None of these.
Answer :- a, b, c
10. Which of the following is true for recursive name resolution?
a. A host may have to send multiple DNS requests to several DNS servers.
b. A host sends a single DNS request to its next higher-level DNS server.
c. Name resolution happens recursively within the host itself.
d. All of these.
Answer :- b
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL Ethical Hacking Week 7 Assignment Answers 2023
1. Which of the following is/are true for Unkeyed hash function (Modification Detection Code)?
a. Unkeyed hash function is used to preserve integrity of message.
b. Unkeyed hash function is used to authenticate source of message.
c. Unkeyed hash function produces an output that depends only on the input data.
d. None of these.
Answer :- a, c
2. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:
H1 = HASH (M1)
H2 = HASH (M2)
When do we say there is a collision?
а. Н1 = H2.
b. M1 = M2.
c. H1 = HASH (H2).
d. None of these.
Answer :- a
3. Which of the following corresponds to second preimage resistance in the context of hash functions?
a. Except of few hash values H, it should be difficult to find a message M1 such that HASH(M1) = H.
b. Given a message M1, it should be difficult to find another message M2 such that HASH(M1) = HASH(M2).
c. It should be difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2).
d. None of these.
Answer :- b
4. What is the message digest length of MD5 and SHA-1 hash functions?
a. 32-bit, 64-bit.
b. 64-bit, 128-bit.
c. 128-bit, 160-bit.
d. 128-bit, 256-bit.
e. None of these.
Answer :- c
5. Which of the following is/are not hash functions?
a. MD5
b. Triple-DES
c. SHA-1
d. RSA
Answer :- b, d
6. Hash functions are faster than symmetric and public key encryption?
a. True
b. False
Answer :- a
7. Which of the following is/are false for digital signature?
a. Digital signature is legally equivalent to hand-written signature.
b. In digital signature, signer uses his public key to sign.
c. Anybody having access to the signer’s public key can verify the signature.
d. None of these.
Answer :- b
8. Which of the following statement(s) is/are true?
a. Secure Socket Layer (SSL) provides security to the data transferred between browser and server.
b. SSL can be used for any network service running over TCP/IP.
c. SSL Handshake Protocol provides mutual authentication.
d. None of these.
Answer :- a, b, c
9. Which of the following statements) is/are true for SSL Alert Protocol?
a. If the first byte is 1 then it indicates that this alert has no impact on the connection between sender and receiver.
b. If the fist byte is 1 then the SSL connection is terminated.
c. If the first byte is 2 then it indicates that this alert has no impact on the connection between sender and receiver.
d. If the first byte is 2 then the SSL connection is terminated.
Answer :- a, d
10. Consider the following statements:
(i SSL is designed to establish secure connection between two hosts.
(ii) s-HTTP is designed to send individual messages securely.
a. Only (i) is true
b. Only (ji) is true
c. Both (i) and (li) are true
d. Both (i) and (i) are false.
Answer :- c
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL Ethical Hacking Week 6 Assignment Answers 2023
Q1. Which of the following is not an example of active security attack?
a. Masquerade
b. Replay
c. Traffic analysis
d. Modification
e. Denial of Service.
Answer:- c
Q2. Consider the following statements:
(i) In symmetric key cryptography, single shared key is used by sender and receiver.
(ii) In Asymmetric key cryptography, separate keys are used by sender and receiver.
a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true.
d. Both (i) and (in) are false.
Answer:- c
Q3. 15 parties want to exchange messages securely using a symmetric key encryption algorithm. The number of distinct key values required will be __________________
Answer:- 105
Q4. Consider a mono-alphabetic cipher with the following key value:
(ABCDIJKLEFGH MNO PUV WXQRST Y Z)
What will be the encrypted form of the message “WIN DO W” ?
a. WENDHW
b. SKNGHS
C. SENDOS
d. None of these.
Answer:- c
Q5. How many AES rounds are required for 192-bit key size?
a. 10
b. 11
c. 12
d. 14
Answer:- c
Q6. What is the key length in data encryption standard (DES)?
a. 56
b. 64
c. 128
d. 192
Answer:- a
Q7. 100 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be _______________
Answer:- 200
Q8. In Digital signature sender signs a message with its:
a. Private key
b. Public key
Answer:- a
Q9. On which difficult mathematical problem does the security of RSA algorithm depend on?
a. Discrete logarithm problem.
b. Testing whether a given number if prime or not.
c. Prime factorization problem.
d. The RSA threshold detection.
e. All of these.
Answer:- c
Q10. Which of the following statements) is/are true for Diffie-Hellman Key Exchange algorithm?
a. It allows group of users to agree on secret key over insecure channel.
b. The security of the algorithm depends on prime factorization problem.
c. The algorithm is vulnerable to man-in-the-middle attack.
d. It does not require any prior communication between sender and receiver.
e. All of these.
Answer:- a, c, d
NPTEL Ethical Hacking Week 5 Assignment Answers 2023
1. Which of the following tools can be used for scanning vulnerabilities?
a. Hypervisor
b. Nessus
c. Hydra
d. Nmap
e. Crunch
Answer:- b, d
2. NMAP scripts can be used for:
a. Vulnerability scanning
b. Backdoor detection.
c. Port detection.
d. Password attack.
e. None of these.
Answer:- a, b, c
3. Which of the following MAP scripts is used to identify the OS of a target system?
a. smb-os-brute
b. smb-os-discovery
c. http-os-check
d. None of these.
Answer:- b
4. Which of the following scripts can be used to detect if a target system is vulnerable to Dos
attack?
a. http-methos
b. http-brute
c. http-dos-ckeck
d. http-slowloris-check
e. ftp-anon
Answer:- d
5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a. ssh 10.0.0.1 -p pwd
b. ssh 10.0.0.1 -I pwd -p user
c. ssh 10.0.0.1 user pwd
d. None of these
Answer:- d
6. The necessary parameters required to generate word list using crunch tool is:
a. Minimum length of the word list.
b. Maximum length of the word list.
c. File name where the word list will be stored.
d. No parameters are required to generate a word list.
Answer:- a, b,
7. Which of the following tools can be used to perform password attack?
a. Hydra
b. Archive.org
c. Netcraft
d. Whois
e. None of these.
Answer:- a
8. Which of the following can be used for gaining higher privileges than existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. Triangular privilege escalation.
e. None of these.
Answer:- a
9. Which of the following approaches can be used to extract information about all users in a target system?
a. Use of map script smb-enum-user
b. Hydra tool
c. Crunch tool
d. Enum4linux
Answer:- a, d
10. In an attack using the remote administrative tool, which part of the tool needs to be placed in
target system?
a. Client
b. Server
Answer:- b
11. To upload any file in the target system which is connected through FT connection which of the following command can be used?
a. put
b. get
c. upload
d. download
Answer:- a
12. Which of the following can self-replicate itself?
a. Trojan
b. Virus
c. Ransomware
d. All of these
Answer:- b
13. How a malware can get inside into a system?
a. Removable devices
b. Attachments
c. Fake Programs
d. Untrusted sites and freeware software.
Answer:- a, b, c, d
14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
a. True
b. False
Answer:- a
15. Which of the following commands is used to see all arp entries in a system?
a. arp -a
b. arp-s
c. arp-i
d. arp-d
Answer:- a
NPTEL Ethical Hacking Week 4 Assignment Answers 2023
Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.
Answer:- a, c
Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Answer:- a, d
Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra
Answer:- c, d, e
Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.
Answer:- f
Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these
Answer:- d
Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.
Answer:- a
Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these
Answer:- a
Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU
Answer:- a
Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- d
Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- b
Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer:- a, b
Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False
Answer:- a
Q13. By default how many ports are scanned in MAP for a target system
Answer:- 1000
Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.
Answer:- d
Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these
Answer:- c
NPTEL Ethical Hacking Week 3 Assignment Answers 2023
1. Consider the following statements:
(i) In connection-oriented approach, network layer first makes a connection.
(il) IP protocol uses connection-oriented routing.
a. Only (i) is true
b. Only (ji) is true
c. Both i) and (ii) are true.
d. Both (i) and (i) are false.
Answer :- a
2. Which of the following is/are true for default route?
a. Default route is used when no specific address for next hop is available.
b. In routing table default route is specified by an address 0.0.0.0.
c. In routing table default route is specified by an address 255.255.255.255
d. In routing table default route is specified by an address 127.0.0.1.
e. None of these.
Answer :- a, b
3. Which of the following is/are true for static routing?
a. In static routing routes are user defined.
b. In static routing, routing table updates periodically depending on the network condition.
c. Static routing is easy to configure.
d. None of these.
Answer :- a
4. Which of the following routing flags indicates that the router is up and running?
a. U
b. G
c. H
d. D
e. M
Answer :- a
5. Which of the following statements) is/are true for interior routing protocol?
a. All the participating routers are present in the same autonomous system.
b. The participating routers are present in different autonomous systems.
c. Routers in different autonomous systems exchange messages to update their routing tables.
d. Routers in the same autonomous system exchange messages to update their routing tables.
Answer :- a, d
6. Which of the following statements) is/are false for Routing Information Protocol (RIP)?
a. RIP is an example of interior routing protocol.
b. RIP maintains timers to detect failed links.
c. RIP converges faster for large networks.
d. RIP consumes high bandwidth to update routes.
e. None of these.
Answer :- c
7. Which of the following is/are false for Border Gateway Protocol (BGP)?
a. BGP allows routers belonging to different autonomous systems to exchange routing information.
b. BGP uses TCP connection to send routing messages.
c. BGP can also be used by routers within the same autonomous systems.
d. BGP sends keepalive messages periodically to ensure that the connection between the BGP peers is alive.
e. None of these.
Answer :- e
8. If a packet is to be delivered to a specific host in a network, what kind of address should be used to specify the destination?
a. Unicast address.
b. Broadcast address.
c. Anycast address.
d. None of these.
Answer :- a
9. Which of the following is not true for IPv6?
a. It uses 32-bit IP addresses.
b. IPv6 address does not have any defined classes.
c. It uses 128-bit IP addresses.
d. None of these.
Answer :- a
10. Consider the following routing table in a router. On which interface will an IP packet with destination address 161.44.64.120 be forwarded?
![[Week 12] NPTEL Ethical Hacking Assignment Answers 2023 9 image 11](https://gecmunger.in/wp-content/uploads/2023/08/image-11.png)
a. Interface a
b. Interface b
c. Interface c
d. Interface d
e. Interface e
Answer :- b
[/ihc-hide-content]
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |
NPTEL Ethical Hacking Week 2 Assignment Answers 2023
1. Why there is a need for fragmentation of IP packets?
a. Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.
b. Fragmentation is necessary for faster data transfer.
c. Fragmentation is necessary for error-recovery and flow control.
d. All of these.
Answer :- a.) Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process. IP fragmentation occurs when a large IP packet needs to be transmitted over a network that has a smaller Maximum Transmission Unit (MTU) size. Different networks and technologies have varying MTU sizes due to factors like link-layer protocols and network infrastructure. If an IP packet is larger than the MTU of a particular network segment, it needs to be divided into smaller fragments to ensure successful transmission across that network.
2. Which of the following statements) is/are true?
a. In transparent fragmentation the subsequent networks are aware that the fragmentation had occurred.
b. In transparent fragmentation, it is required to route all packet to the same exit router in a network.
c. In non-transparent fragmentation, each fragment is treated as an independent packet.
d. In non-transparent fragmentation, an exit router reassembles all fragmented packets.
Answer :- b. In transparent fragmentation, it is required to route all packet to the same exit router in a network. c. In non-transparent fragmentation, each fragment is treated as an independent packet.
3. An IP packet arrives at the final destination with the M flag set as 1. Which of the following statement is true about the packet?
a. Prevents the fragmentation from taking place.
b. The packet will be fragmented by the next router.
c. The packet represents a fragment of a larger packet.
d. None of these.
Answer :- c. The packet represents a fragment of a larger packet.
4. Which of the following statements) is/are false for IP address?
a. IP address is 32-bit quantity.
b. IP address is typically expressed as dotted decimal notation where dots are used to separate each of the four octets of the address.
c. IP address consists of three logical parts: network number, host number and port number.
d. None of these.
Answer :- c. IP address consists of three logical parts: network number, host number and port number.
5. Which address classes do the IP addresses 144.16.75.12 and 10.10.85.120 belong to?
a. Class C and Class A
b. Class B and Class C
c. Class B and Class A
d. Class B and Class D
Answer :- c. Class B and Class A
6. Which of the following IP addresses represent broadcast address?
а. 144.15.255.255
b. 144.16.0.255
c. 202.0.255.250
d. 202.0.255.255
Answer :- a, d
7. The maximum number of hosts that are possible in a class C network is_________.
Answer :- 254
8. What is a TCP half-open connection in the context of connection establishment using 3-way handshake?
a. The first transaction does not complete.
b. The second transaction does not complete.
c. The first transaction does not complete but the second transaction completes.
d. The last transaction does not complete.
e. None of these.
Answer :- d
9. In the TCP header field, what do SYN=1 and ACK=0 represent?
a. Connection request message.
b. Connection confirmation message.
c. Reject connection request.
d. Reset connection request.
Answer :- a
10. What is the subnet address if the destination IP address is 144.16.75.105 and the subnet mask is 255.255.240.0?
a. 144.16.32.0
b. 144.16.75.0
c. 144.16.16.0
d. None of these
Answer :- d
NPTEL Ethical Hacking Week 1 Assignment Answers 2023
1. Which of the following points) is/are true for an ethical hacker?
a. An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition.
b. An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss.
C. An ethical hacker is not concerned with improving the organization’s security posture.
d. None of these.
Answer :- d
2. Which of the following statement(s) is/are true?
a. In the black box model, the tester has complete information about the network.
b. In the white box model, the tester does not have any information about the network.
c. In the gray box model, the tester has partial information about the network.
d. None of these.
Answer :- c
3. Which of the following statement(s) is/are false for a packet switched network?
a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
C. It is efficient for busty traffic.
d. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
Answer :- b
4. Which of the following statements) is/are true for datagram-based packet transfer approach?
a. It is a connection-less packet switching approach, where no route is established priori to transfer of packets.
b. In this approach, each packet is transmitted as an independent entity.
c. In this approach each intermediate node can perform dynamic routing.
d. In this approach all the packets reach in order to the destination.
Answer :- a, b, c
5. What is the purpose of the port number in TCP/IP networks?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
c. It uniquely identifies a running application on a specific host in the network.
d. It indicates how many hardware ports are there in the computer system. e. None of these.
Answer :- c
6. Which of the following is not a valid port numbers in TCP/IP?
a. 21
b. 80
c. 443
d. 8080
e. 80800
Answer :- e
7. Which of the following functionality does Address Resolution Protocol (ARP) perform?
a. Map IP addresses to hardware (MAC) addresses.
b. Map hardware addresses (MAC) to IP addresses.
c. Performs error control and correction.
d. Breaks the packet into smaller packets, if required.
Answer :- a
8. Which of the following statements) is/are false?
a. IP provides connectionless, unreliable delivery systems for packets.
b. UDP provides connectionless, unreliable delivery systems for packets
c. TCP provides connectionless, unreliable delivery systems for packets.
d. None of these.
Answer :- c
9. If the IP header is 96 bits long, what will be the value (in decimal) of the “HLEN” field ?
Answer :- 3
10. The maximum size of data that can be accommodated in an IP datagram is bytes.
Answer :- 65515
Course Name | Ethical Hacking |
Category | NPTEL Assignment Answer |
Home | Click Here |
Join Us on Telegram | Click Here |