NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023:- All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course. Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Week 4 Assignment Answers 2023

Q1. Which of the following statements) is/are true for NAT networking mode? a. In NAT mode, the virtual machines cannot access each other. b. NAT mode does not allow access of internet to the installed virtual machines. c. In NAT mode, the hypervisor allocate same IP address to all virtual machines. d. All of these.

Q2, Which of the following statements) is/are true about “Passive Reconnaissance”? a. Information about the target is collected indirectly. b. Information about the target is collected directly. c. There is a chance of detection. d. There is no chance of detection.

Q3. Which of the following can be used for active reconnaissance. a. Whois b. Archive.org C. NMAP d. Nessus e. Metasploit f. Hydra

Q4. Which of the following information cannot be retrieved using active reconnaissance? a. Live host in a network. b. Open ports. c. Services running in the systems. d. Operating system of the target system. e. Vulnerabilities of target machine/application. f. None of these.

Q5. Which of the following tools cannot be used for DNS enumeration? a. host b. dnsenum c. dig d. None of these

Q6. What is the main objective of host discovery? a. Identification of live hosts. b. Identification of services running in the target system. c. Identification of version of the services running in the target system. d. Identification of the operating system of the target systems. e. Identification of open ports.

Q7. Which of the following options is used to trace the details of the sent/received packets? a. –packet-trace b. –reason C. -disable-arp-ping d. None of these

Q8. Which of the following options can be used to perform IMP ECHO sweep? a. -PE b. -PP C. -PM d. -PU

Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation? a. RST b. ACK c. SYN-ACK d. SYN

Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation? a. RST b. ACK c. SYN-ACK d. SYN

Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified? a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open. b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed. C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open. d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Q12. Can the use of firewall prevent port/host scanning? a. True b. False

Q13. By default how many ports are scanned in MAP for a target system

Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP? a. -F b. -p- C. -Pn d. -sn e. We cannot disable port scanning.

Q15. Which of the following options can be used for OS and Version detection? a. -Sn b. -Pn C. -A d. -ST e. None of these

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:-

Q1. What is the purpose of the Hypervisor software?

a. It is a secure software layer that is difficult to hack. b. It opens a terminal window through which commands can be given directly. c. It can create and run multiple virtual machines on a computer system. d. None of these.

Answer:- c. It can create and run multiple virtual machines on a computer system.

Q2. What are some of the features in Kali Linux?

a. It is a secure operating system that has been designed as hack-proof. b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing. c. It is a software distribution created by the company Kali Inc. d. None of these.

👇 FOR NEXT WEEK ASSIGNMENT 5 ANSWERS 👇

Answer:- b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.

Q3. Which of the following statement(s) is/are true about passive reconnaissance?

a. Information about the target is collected indirectly. b. Information about the target is collected directly. c. There is no direct communication with the target system. d. There is direct communication with the target system.

Answer:- (A) & (C)

Q4. Which of the following can be used for passive reconnaissance?

a. Whois b. archive.org c. Netcraft d. Search engines

Answer:- (A), (B), (C), (D)

Q5. How host discovery can be carried out using ICMP sweep?

a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response. b. It uses ICMP protocol to broadcast packets to all the machines in a network. c. It utilizes the vulnerability of TCT connection establishment. d. None of these.

Answer:- a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.

Q6. How does port scanning using TCP Connect works?

a. It creates a half-open connection during TCP connection establishment, and decides whether the port is open. b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open. c. It drops TCP packets as they arrive from the target. d. None of these.

Answer:- b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.

Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?

a. RST b. ACK c. SYN-ACK d. SYN

Answer:- d. SYN

Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?

a. It allocates unique IP addresses to all operating systems. b. It allocates a virtual IP address to all operating systems. c. It allocates IP address of the HOST system to all operating systems. d. In this mode an operating system can access internet e. None of these.

Note:-   We are going to post answers of all weeks you can join us on telegram for quick updates and if there are any changes in answers then will update on our telegram channel only.

Answer:- a,c

Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?

Answer:- b. archive.org

Q10. Which of the following search operators can narrow down the search results to a specific website?

a. inurl b. OR c. AND d. site e. filetype

Answer:- For Answer Click Here

Q11. What is the purpose of the following NMAP command? nmap –sn 192.55.70.110-120

a. A trace sweep b. A ping scan c. A port scan d. None of these

Answer:- b. A ping scan

Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?

a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open. b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed. c. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open. d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Answer:- (A), (B)

Q13. By default how many ports are scanned in nmap for a target system ………….?

Answer:- 1000

Q14. Which of the following options can be used for OS and Version detection?

a. –sn b. -Pn c. -A d. –sT e. None of these

Answer:- c. -A

Q15. Which of the following nmap options can be used to carry out UDP scan?

a. -sP b. -sS c. -sU d. None of these

👇 FOR NEXT WEEK ASSIGNMENT ANSWERS 👇

Answer:- c. -sU

Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?

a. -sn b. -p c. -Pn d. None of these

Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?

a. -F b. -p20-100 c. -p22, 23, 80, 8080 d. None of these

Answer:- (A), (B), (C)

Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?

a. True b. False

Answer:- a. True

Q19. Can the use of firewall prevent port/host scanning?

Disclaimer :- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:-  CLICK HERE

Join Our Telegram:-  CLICK HERE

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:- All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

4 thoughts on “NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023”

  • Pingback: NPTEL Ethical Hacking Assignment 3 Quiz Answers 2022
  • Pingback: NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022
  • Pingback: NPTEL Ethical Hacking Assignment 6 Quiz Answers 2022
  • Pingback: NPTEL Ethical Hacking Assignment 7 Answers 2022

Leave a Comment Cancel reply

You must be logged in to post a comment.

  • Computer Science and Engineering
  • NOC:Ethical Hacking (Video) 
  • Co-ordinated by : IIT Kharagpur
  • Available from : 2019-07-25
  • Intro Video
  • Lecture 01: Introduction to Ethical Hacking
  • Lecture 02: Basic Concepts of Networking (part-I)
  • Lecture 03:Basic Concepts of Networking (part-II)
  • Lecture 04: TCP/IP Protocol Stack (part-I)
  • Lecture 05: TCP/IP Protocol Stack (Part-II)
  • Lecture 06: IP addressing and routing (Part I)
  • Lecture 07: IP addressing and routing (Part II)
  • Lecture 08: TCP and UDP (Part I)
  • Lecture 09: TCP and UDP (Part II)
  • Lecture 10: IP subnetting
  • Lecture 11: Routing protocols (Part I)
  • Lecture 12: Routing protocols (Part II)
  • Lecture 13: Routing protocols (Part III)
  • Lecture 14: IP version 6
  • Lecture 15: Routing examples
  • Lecture 16: "Software Installation and Network Setup"
  • Lecture 17: Information Gathering (Part 1)
  • Lecture 18: Information Gathering (Part 2)
  • Lecture 19: Port Scanning Using NMAP
  • Lecture 20: Other Features of NMAP
  • Lecture 21: Metasploit Exploiting System Software - I
  • Lecture 22: Metasploit Exploiting System Software - II
  • Lecture 23: Metasploit Exploiting System Software and Privilege
  • Lecture 24: Metasploit Social Eng Attack
  • Lecture 25: MITM (Man in The middle)Attack
  • Lecture 26: Basic concepts of cryptography
  • Lecture 27: Private-key cryptography (Part I)
  • Lecture 28: Private-key cryptography (Part II)
  • Lecture 29: Public-key cryptography (Part I)
  • Lecture 30: Public-key cryptography (Part II)
  • Lecture 31: Cryptographic hash functions (Part I)
  • Lecture 32: Cryptographic hash functions (Part II)
  • Lecture 33: Digital signature and certificate
  • Lecture 34: Applications (Part I)
  • Lecture 35: Applications (Part II)
  • Lecture 36: Steganography
  • Lecture 37: Biometrics
  • Lecture 38: Network Based Attacks (Part I)
  • Lecture 39: Network Based Attacks (Part II)
  • Lecture 40: DNS and Email Security
  • Lecture 41: Password cracking
  • Lecture 42: Phishing attack
  • Lecture 43: Maloeware
  • Lecture 44: Wifi hacking
  • Lecture 45: Dos and DDos attack
  • Lecture 46: Elements of Hardware Security
  • Lecture 47: Side Channel Attacks (Part I)
  • Lecture 48: Side Channel Attacks (Part II)
  • Lecture 49: Physical Unclonable Function
  • Lecture 50: Hardware Trojan
  • Lecture 51 : Web Application Vulnerability Scanning
  • Lecture 52 : Part 1 : SQL Injection Authentication Bypass
  • Lecture 52 : Part 2: SQL Injection Error Based
  • Lecture 52 : Part 3 : SQL Injection Error Based from Web Application
  • Lecture 53 : SQLMAP
  • Lecture 54 : Cross Site Scripting
  • Lecture 55 : File Upload Vulnerability
  • Lecture 56 : The NMAP Tool: A Relook (Part I)
  • Lecture 57 : The NMAP Tool: A Relook (Part II)
  • Lecture 58 : The NMAP Tool: A Relook (Part III)
  • Lecture 59 : Network Analysis using Wireshark
  • Lecture 60 : Summarization of the Course
  • Watch on YouTube
  • Assignments
  • Download Videos
  • Transcripts

AnswerGPT Logo

If You Are Facing Any Problem In Payment Then Email On : [email protected]

Pyq [week 1-12] nptel ethical hacking assignment answers 2023.

nptel ethical hacking assignment 4 answers 2023

About Course

[Week 1-12] NPTEL Ethical Hacking Assignment Answers 2023

Course Content

Week 1 answers 2023, week 1 assignment answers, week 2 answers 2023, week 2 assignment answers, week 3 answers 2023, week 3 assignment answers, week 4 answers 2023, week 4 assignment answer, week 5 answers 2023, week 5 assignment answers, week 6 answers 2023, week 6 assignment answers, week 7 answers 2023, week 7 assignment answers, week 8 answers 2023, week 8 assignment answers, week 9 answers 2023, week 9 assignment answers, week 10 answers 2023, week 10 assignment answers, week 11 answers 2023, week 11 assignment answers, week 12 answers 2023, week 12 assignment answers, student ratings & reviews.

Want to receive push notifications for all major on-site activities?

Insert/edit link

Enter the destination URL

Or link to existing content

Quizermania Logo

Ethical Hacking | NPTEL 2023 | Week 5 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the  Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions .

Course layout

Answers COMING SOON! Kindly Wait!

Week 1:  Assignment answers Week 2: Assignment answers Week 3: Assignment answers Week 4: Assignment answers Week 5: Assignment answers Week 6: Assignment answers Week 7: Assignment answers Week 8: Assignment answers Week 9: Assignment answers Week 10: Assignment answers Week 11: Assignment answers Week 12: Assignment answers

NOTE:  You can check your answer immediately by clicking show answer button. This set of “ Ethical Hacking NPTEL 2023 Week 5 Assignment Solution” contains 15 questions.

Now, start attempting the quiz.

Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions

Q1. Which of the following tools can be used for scanning vulnerabilities?

a) Hypervisor b) Nessus c) Hydra d) Nmap e) Crunch

Answer: b), d)

Q2. NMAP scripts can be used for:

a) Vulnerability scanning b) Backdoor detection c) Port detection d) Password attack e) None of these

Answer: a), b), c)

Q3. Which of the following NMAP scripts is used to identify the OS of a target system?

a) smb-os-brute b) smb-os-discovery c) http-os-check d) None of these

Q4. Which of the following scripts can be used to detect if a target system is vulnerable to DoS attack?

a) http-methos b) http-brute c) http-dos-check d) http-slowloris-check e) ftp-anon

Q5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?

a) ssh 10.0.0.1 -p pwd b) ssh 10.0.0.1 -l pwd -p user c) ssh 10.0.0.1 user pwd d) None of these

Ethical Hacking NPTEL week 5 Assignment Solutions

Q6. The necessary parameters required to generate word list using crunch tool is:

a) Minimum length of the word list. b) Maximum length of the word list. c) File name where the word list will be stored. d) No parameters are required to generate a word list.

Q7. Which of the following tools can be used to perform password attack?

a) Hydra b) Archive.org c) Netcraft d) Whois e) None of these

Q8. Which of the following can be used for gaining higher privileges than existing one?

a) Vertical privilege escalation b) Horizontal privilege escalation c) Diagonal privilege escalation d) Triangular privilege escalation e) None of these

Q9. Which of the following approaches can be used to extract information about all users in a target system?

a) Use of nmap script smb-enum-user b) Hydra tool c) Crunch tool d) Enum4linux

Answer: a), d)

Q10. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?

a) Client b) Server

Q11. To upload any file in the target system which is connected through FTP connection which of the following command can be used?

a) put b) get c) upload d) download

Q12. Which of the following can self-replicate itself?

a) Trojan b) Virus c) Ransomware d) All of these

Q13. How a malware can get inside into a system?

a) Removable devices b) Attachments c) Fake Programs d) Untrusted sites and freeware software

Answer: a), b), c), d)

Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing/ARP poisoning.

a) True b) False

Q15. Which of the following commands is used to see all arp entries in a system?

a) arp -a b) arp -s c) arp -i d) arp -d

Ethical Hacking NPTEL 2022 Week 5 Assignment Solutions

Q1. Which of the following may be used for password cracking?

a) Dictionary attack. b) Social engineering attack. c) TCP SYN attack. d) DoS attack.

Answer: a), b)

Q2. Which of the following can be performed using the NMAP tool?

a) Identify open ports on a target system. b) Identify the operating system that is running on a target system. c) Identify the hosts available in a network. d) Vulnerability available on a target system.

Q3. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?

a) nmap — script=script_name.nse b) nmap — script script_name.nse c) nmap — script script_name d) nmap script_name.nse

Q4. Which of the following http scripts can be used to detect if a target system is running a webserver?

a) http-methos b) http-brute c) http-slowloris-check d) ftp-anon

Q5. Which of the following approaches can be used to create a secure hacking environment?

a) Use of proxy tools/servers b) Using kali Linux in a live mode c) Use of MAC changer tool d) Use of firewalls

Answer: a), c)

Q6. Which of the following ports should be open on the target system to run a nmap script http-malware-host?

a) http b) ssh c) telnet d) Dose not require any services to be running

Q7. Which of the following protocol(s) is/are not vulnerable to sniffing?

a) HTTP b) Telnet c) POP d) HTTPS e) SMTP

<< Prev- Ethical Hacking Week 4 Assignment Solutions

>> Next- Ethical Hacking Week 6 Assignment Solutions

NPTEL answers: Problem solving through programming in C

Programming in Java NPTEL week 1 quiz answers

NPTEL – Python for Data Science assignment solutions

Nptel – Deep Learning assignment solution

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Related Posts

Operating system fundamentals | nptel | week 0 assignment 0 solution, nptel operating system fundamentals week 1 assignment solutions, nptel operating system fundamentals week 10 answers, nptel operating system fundamentals week 2 assignment solutions, nptel operating system fundamentals week 3 assignment solutions, nptel operating system fundamentals week 4 assignment solutions, leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • 1st Central Law Reviews: Expert Legal Analysis & Insights
  • Amazon Quiz
  • Flipkart Quiz
  • Play & Win 50,000 Coins
  • Privacy Policy

NPTEL Ethical Hacking Assignment 2 Answers 2023

  • by QuizXp Team
  • February 2, 2023 February 6, 2023

NPTEL Ethical Hacking Assignment 2 Answers 2023

NPTEL Ethical Hacking Assignment 2 Answers 2023? This article will help you with the answer to the  Nation al Programme on Technology Enhanced Learning  ( NPTEL )  Course “ Ethical Hacking Assignment 2 “

Below you can find the answers for Ethical Hacking Assignment 2 Answers 2023

NPTEL Ethical Hacking Assignment 2 Answers 2023:-

1. Which of the following is/are false for IP fragmentation?

For week 1 Answer: click Here

2. Consider the following statements: (i) In transparent fragmentation, all fragmented packets are reassembled by an exit router. (ii) In non-transparent fragmentation, all fragmented packets reassembled by host.

3. For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used by IP?

Answer:- a,b,e

4. An IP packet arrives at a router with the first eight bits as 01001100. How many bytes are there in the OPTIONS field

5. In an IP packet, the value of HLEN is 6, and the value of the TOTAL LENGTH field is 1000 (one thousand). The number of data bytes in the packet will be _______.

6. Which of the following is/are true for IP addressing?

7. Which of the following is/are not a feature of TCP?

8. Which of the following statement(s) is/are false for flag bits in TCP header?

9. What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.242.0?

10. An organization is allotted a block with beginning address as: 144.16.192.16/28 in CIDR notation. What will be the address range for that block?

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at  [email protected]

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.

x

swayam-logo

Ethical Hacking

Note: This exam date is subjected to change based on seat availability. You can check final exam date on your hall ticket.

Page Visits

Course layout, books and references.

  • Data and Computer Communications -- W. Stallings.
  • Data Communication and Networking -- B. A. Forouzan
  • TCP/IP Protocol Suite -- B. A. Forouzan
  • UNIX Network Programming -- W. R. Stallings
  • Introduction to Computer Networks and Cybersecurity -- C-H. Wu and J. D. Irwin
  • Cryptography and Network Security: Principles and Practice -- W. Stallings
  • ** Various web resources **

Instructor bio

nptel ethical hacking assignment 4 answers 2023

Prof. Indranil Sengupta

Course certificate.

nptel ethical hacking assignment 4 answers 2023

DOWNLOAD APP

nptel ethical hacking assignment 4 answers 2023

SWAYAM SUPPORT

Please choose the SWAYAM National Coordinator for support. * :

NPTEL Ethical Hacking Week 6 Assignment Answers 2023

NPTEL Ethical Hacking Assignment Answers 2023

NPTEL Ethical Hacking Week 6 Assignment Solutions 2023

Q1. Which of the following is not an example of active security attack? a. Masquerade b. Replay c. Traffic analysis d. Modification e. Denial of Service.

Q2. Consider the following statements: (i) In symmetric key cryptography, single shared key is used by sender and receiver. (ii) In Asymmetric key cryptography, separate keys are used by sender and receiver. a. Only (i) is true b. Only (ii) is true c. Both (i) and (ii) are true. d. Both (i) and (in) are false.

Q3. 15 parties want to exchange messages securely using a symmetric key encryption algorithm. The number of distinct key values required will be __________________

Q4. Consider a mono-alphabetic cipher with the following key value: (ABCDIJKLEFGH MNO PUV WXQRST Y Z) What will be the encrypted form of the message “WIN DO W” ? a. WENDHW b. SKNGHS C. SENDOS d. None of these.

Q5. How many AES rounds are required for 192-bit key size? a. 10 b. 11 c. 12 d. 14

Q6. What is the key length in data encryption standard (DES)? a. 56 b. 64 c. 128 d. 192

Q7. 100 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be _______________

Q8. In Digital signature sender signs a message with its: a. Private key b. Public key

Q9. On which difficult mathematical problem does the security of RSA algorithm depend on? a. Discrete logarithm problem. b. Testing whether a given number if prime or not. c. Prime factorization problem. d. The RSA threshold detection. e. All of these.

Q10. Which of the following statements) is/are true for Diffie-Hellman Key Exchange algorithm? a. It allows group of users to agree on secret key over insecure channel. b. The security of the algorithm depends on prime factorization problem. c. The algorithm is vulnerable to man-in-the-middle attack. d. It does not require any prior communication between sender and receiver. e. All of these.

Leave a comment Cancel reply

Save my name, email, and website in this browser for the next time I comment.

DBC Itanagar

All India News

{Week 3} NPTEL Ethical Hacking Assignment Answers 2023

admin

NPTEL Ethical Hacking Assignment Solution 2023

NPTEL Ethical Hacking Assignment Answers

NPTEL Ethical Hacking Week 3 Assignment Answers 2023

1. Consider the following statements: (i) In connection-oriented approach, network layer first makes a connection. (il) IP protocol uses connection-oriented ro u ting. a. Only (i) is true b. Only (ji) is true c. Both (i) and (ii) are true. d. Both (i) and (i) are false.

2. Which of the following is/are true for default route? a. Default route is used when no specific address fo r next hop is available. b. In routing table default route is specified by an address 0.0.0.0. c. In routing table default route is specified by an address 255.255.255.255 d. In routing table default route is specified by an address 127.0.0.1. e. None of these.

3. Which of the following is/are true for static routin g ? a. In static routing routes are user defined. b. In static routing, routing table updates periodically depending on the network condition. c. Static routing is easy to configure. d. None of these.

4. Which of the following routing flags indicates that the router is u p and running? a. U b. G c. H d. D e. M

5. Which of the following statements) is/are true for interior routin g protocol? a. All the participating routers are present in the same autonomous system. b. The participating routers are present in different autonomous systems. c. Routers in different autonomous systems exchange messages to update their routing tables. d. Routers in the same autonomous system exchange messages to update their routing tables.

6. Which of the following statements) is/are false for Routing Infor m ation Protocol (RIP)? a. RIP is an example of interior routing protocol. b. RIP maintains timers to detect failed links. c. RIP converges faster for large networks. d. RIP consumes high bandwidth to update routes. e. None of these.

7. Which of the following is/are false for Border Gateway Protocol (BGP)? a. BGP allows routers belonging to different autonomous systems to exch a nge routing information. b. BGP uses TCP connection to send routing messages. c. BGP can also be used by routers within the same autonomous systems. d. BGP sends keepalive messages periodically to ensure that the connection between the BGP peers is alive. e. None of these.

8. If a packet is to be delivered to a specific host in a netw o rk, what kind of address should be used to specify the destination? a. Unicast address. b. Broadcast address. c. Anycast address. d. None of these.

9. Which of the following is not true for I P v6? a. It uses 32-bit IP addresses. b. IPv6 address does not have any defined classes. c. It uses 128-bit IP addresses. d. None of these.

10. Consider the following routing table in a router. On which interface will an IP packet with destination address 161.44.64.120 be forwarded?

image 11

a. Interface a b. Interfac e b c. Interface c d. Interface d e. Interface e

NPTEL Ethical Hacking Week 1 Assignment Answers 2023

1. Which of the following points) is/are true for an ethical hack e r? a. An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition. b. An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss. C. An ethical hacker is not concerned with improving the organization’s secu r ity posture. d. None of these.

2. Which of the following statement(s) is/are true?

a. In the black box model, the tester has complete information about the network. b. In the white box model, the tester doe s not have any information about the network. c. In the gray box model, the tester has partial information about the network. d. None of these.

3. Which of the following statement(s) is/are false for a packet switched network?

a. A communication link can be shared by more than one connection. b. A communication link is dedicated to a connection and cannot be shared with other connections. C. It is efficient for busty traffic. d. The packet transfer delay between a pa i r of nodes may depend on the prevailing network traffic.

4. Which of the following statements) is/are true for datagram-based packet transfer approach?

a. It is a connection-less packet switching approach, where no route is established priori to transfer of packets. b. In this approach, each packet is transmitted as an independent entity. c. In this approach each intermediate node can perform dynamic routing. d. In this approach all the packets reach in o rder to the destination.

5. What is the purpose of the port number in TCP/IP networks?

a. It uniquely identifies a network interface of a computer system. b. It uniquely identifies a host in the network. c. It uniquely identifies a running application on a specific host in the network. d. It indicates how many hardware ports are there in the computer system. e. None of these.

6. Which of t h e following is not a valid port numbers in TCP/IP?

a. 21 b. 80 c. 443 d. 8080 e. 80800

7. Which of the following functionality does Address Resolution Protocol (ARP) perform?

a. Map IP addresses to hardware (MAC) addresses. b. Map hardwa r e addresses (MAC) to IP addresses. c. Performs error control and correction. d. Breaks the packet into smaller packets, if required.

8. Which of the following statements) is/are false?

a. IP provides connectionless, unreliable del i very systems for packets. b. UDP provides connectionless, unreliable delivery systems for packets c. TCP provides connectionless, unreliable delivery systems for packets. d. None of these.

9. If the IP head e r is 96 bits long, what will be the value (in decimal) of the “HLEN” field ?

10. The maximum size of data that can be accommodat e d in an IP datagram is bytes.

NPTEL Data Structure And Algorithms Using Java Assignment Answers 2023

Latest News

Nptel soft skill development week 1 assignment answers 2024.

CBSE Schools

CBSE Schools : सीबीएसई बोर्ड की बड़ी कार्रवाई ! बिहार – झारखंड के 36 स्कूलों की मान्यता रद्द, देखें पूरी लिस्ट.

Bank Holidays 2024

Bank Holidays 2024 : जनवरी में 16 दिन बंद रहेंगे बैंक, ब्रांच जाने से पहले चेक कर लें छुट्टियों की लिस्ट.

Maruti Swift Engine

32 के तगड़े माइलेज से Creta की वाट लगा रही Maruti की शानदार कार, बेहतरीन फीचर्स के साथ इतनी है कीमत

Indian Oil Corporation Limited

Indian Oil Corporation Limited 1603 Recruitment इंडियन ऑयल कॉरपोरेशन लिमिटेड अप्रेंटिसशिप 1603 पदों पर भर्ती

Sign in to your account

Username or Email Address

Remember Me

IMAGES

  1. Ethical Hacking

    nptel ethical hacking assignment 4 answers 2023

  2. Ethical Hacking Week 4 Solution Answers 2023

    nptel ethical hacking assignment 4 answers 2023

  3. NPTEL Ethical Hacking Week 4 Assignment Solutions 2023 || Jan- Apr 2023

    nptel ethical hacking assignment 4 answers 2023

  4. Ethical Hacking

    nptel ethical hacking assignment 4 answers 2023

  5. Ethical Hacking || NPTEL Week-4 Assignment Answers 2023||JULY-OCT||#

    nptel ethical hacking assignment 4 answers 2023

  6. Ethical Hacking Week 4 Assignment 4 Solution

    nptel ethical hacking assignment 4 answers 2023

VIDEO

  1. NPTEL Ethical Hacking WEEK 7 Quiz Assignment Solutions

  2. NPTEL Ethical Hacking WEEK8 Quiz Assignment Solutions

  3. NPTEL Ethical Hacking WEEK 9 Quiz Assignment Solutions

  4. Nptel Ethical Hacking Week 1 Assignment Solution and Answer

  5. NPTEL Ethical Hacking WEEK9 Quiz Assignment Solutions

  6. NPTEL Ethical Hacking WEEK7 Quiz Assignment Solutions

COMMENTS

  1. NPTEL Week 4 Assignment: Ethical Hacking July 2023.

    Immerse yourself in the world of ethical hacking with our comprehensive guide to NPTEL's Week 4 Assignment in the course "Ethical Hacking" for July 2023. Exp...

  2. NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

    Don't struggle with NPTEL's Ethical Hacking week 4 assignment 2023 any longer. In this 3 minutes 50 seconds video, 15 quiz questions are solved for you to us...

  3. NPTEL Ethical Hacking WEEK4 Quiz Assignment Solutions

    🔊 Ethical Hacking NPTEL Elective Course July 2023 | GATE NPTEL | https://techiestalk.in/⛳ABOUT THE COURSE :NPTEL Ethical Hacking WEEK4 Quiz Assignment Solut...

  4. Ethical Hacking

    The assignment 0 for the course Ethical Hacking has been released. This assignment is based on a prerequisite of the course. Kindly note that marks obtained in this assignment will not be considered for the final assessment. You can find the assignment under Week 0 unit on the left-hand side of your screen.

  5. NPTEL Ethical Hacking Week 4 Assignment Answers 2023

    NPTEL Ethical Hacking Week 4 Assignment Answers 2023. Q1. Which of the following statements) is/are true for NAT networking mode? a. In NAT mode, the virtual machines cannot access each other. b. NAT mode does not allow access of internet to the installed virtual machines. c. In NAT mode, the hypervisor allocate same IP address to all virtual ...

  6. NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

    NPTEL Ethical Hacking Week 4 Assignment Answers 2023. Q1. Which of the following statements) is/are true for NAT networking mode? a. In NAT mode, the virtual machines cannot access each other. b. NAT mode does not allow access of internet to the installed virtual machines. c. In NAT mode, the hypervisor allocate same IP address to all virtual ...

  7. NPTEL :: Computer Science and Engineering

    NPTEL provides E-learning through online Web and Video courses various streams. Toggle navigation. ... Week_01_Assignment_01: Week_01_Assignment_01: Week_02_Assignment_02: Week_02_Assignment_02: ... Introduction to Ethical Hacking: Download Verified; 2: Lecture 02: Basic Concepts of Networking (part-I) Download

  8. NPTEL Ethical Hacking Week 4 Assignment Solutions 2023

    NPTEL Ethical Hacking Week 4 Assignment Solutions 2023 || Jan- Apr 2023Course: Ethicsl HackingOffered by: IIT RorkeeDuration: 12 weeksStart Date: 23 Jan 202...

  9. Ethical Hacking

    The questions will be on the computer and the answers will have to be entered on the computer; type of questions may include multiple choice questions, fill in the blanks, essay-type answers, etc. ... Ethical Hacking - Assignment - 4 Solution Released ... Here is the much-awaited announcement on registering for the Jan 2023 NPTEL course ...

  10. NPTEL Ethical Hacking Assignment 4 Answers 2022

    If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100. Below you can find the answers for NPTEL Ethical Hacking Assignment 4. Assignment No. Answers. Ethical Hacking Assignment 1. Click Here. Ethical Hacking Assignment 2. Click Here. Ethical Hacking Assignment 3.

  11. Ethical Hacking

    Ethical Hacking : Due date for Assignment 2 Extended! Dear Learners. Based on requests received, we are extending the deadline of the assignment 2. Deadline for Assignment 2 has been extended till August 21, 2019 - 23:59 IST Assignment 1 will close on 14 August 2019 - 23:59 IST, as per the original deadline.

  12. PYQ [Week 1-12] NPTEL Ethical Hacking Assignment Answers 2023

    [Week 1-12] NPTEL Ethical Hacking Assignment Answers 2023. Course Content Week 1 Answers 2023 Week 1 Assignment Answers Week 2 Answers 2023 Week 3 Answers 2023 Week 4 Answers 2023 Week 5 Answers 2023 Week 6 Answers 2023 Week 7 Answers 2023 ...

  13. Ethical Hacking

    Ethical Hacking NPTEL 2023 Week 3 Assignment Solutions. Q1. Consider the following statements: (i) In connection-oriented approach, network layer first makes a connection. (ii) IP protocol uses connection-oriented routing. a) Only (i) is true. b) Only (ii) is true. c) Both (i) and (ii) are true.

  14. Ethical Hacking

    Show Answer. Ethical Hacking NPTEL week 5 Assignment Solutions. Q6. The necessary parameters required to generate word list using crunch tool is: a) Minimum length of the word list. b) Maximum length of the word list. c) File name where the word list will be stored. d) No parameters are required to generate a word list.

  15. Ethical Hacking Week 4 Solution Answers 2023

    This video is for providing Ethical HackingThis video is for Education PurposeThis Course is provided by NPTEL - Online courses This video is made in top...

  16. NPTEL Ethical Hacking Week 8 Assignment Answers 2023

    Tags NPTEL Answer Key 2023, NPTEL Assignment Answers 2023, NPTEL Ethical Hacking Week 8 Assignment Answers NPTEL Entrepreneurship Week 8 Assignment Answers 2023 NPTEL Introduction To Industry 4.0 And Industrial Internet Of Things Week 8 Assignment Answers 2023

  17. Ethical Hacking

    Ethical Hacking - - Announcements. NPTEL: Exam Registration is open now for Jan 2023 courses! Dear Candidate, Here is a golden opportunity for those who had previously enrolled in this course, but could not participate in the exams or were absent/did not pass the exam for this course. This course is being reoffered in Jan 2023 and we are giving ...

  18. NPTEL Ethical Hacking Assignment 2 Answers 2023

    1. Which of the following is/are false for IP fragmentation? Answer:- d. For week 1 Answer: click Here. 2. Consider the following statements: (i) In transparent fragmentation, all fragmented packets are reassembled by an exit router. (ii) In non-transparent fragmentation, all fragmented packets reassembled by host.

  19. Ethical Hacking

    Ethical Hacking. ABOUT THE COURSE :Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks ...

  20. NPTEL Ethical Hacking Week 6 Assignment Answers 2023

    e. Denial of Service. Answer:- c. Q2. Consider the following statements: (i) In symmetric key cryptography, single shared key is used by sender and receiver. (ii) In Asymmetric key cryptography, separate keys are used by sender and receiver. a.

  21. Ethical Hacking Assignment Week 4 Answer || Nptel Ethical ...

    Ethical Hacking Assignment Week 4 Answer || Nptel Ethical Hacking Week 4 assignment Answer #nptel #mrethic #nptel2023 #nptelsolution #nptelcourseanswers #npt...

  22. {Week 3} NPTEL Ethical Hacking Assignment Answers 2023

    NPTEL Ethical Hacking Week 3 Assignment Answers 2023. 1. Consider the following statements: (i) In connection-oriented approach, network layer first makes a connection. (il) IP protocol uses connection-oriented ro u ting. a. Only (i) is true. b. Only (ji) is true.

  23. NPTEL Ethical Hacking WEEK 10 Quiz Assignment Solutions

    🔊 Ethical Hacking NPTEL Elective Course 2023 | https://techiestalk.in/⛳ABOUT THE COURSE :NPTEL Ethical Hacking WEEK 10 Quiz Assignment Solutions | Swayam 20...