Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

Week 4 NPTEL Ethical Hacking Assignment 4 Answers 2022

NPTEL Ethical Hacking Assignment 4 Answers (WEEK 4)

Q1. What is the purpose of the Hypervisor software?

(a) It is a secure software layer that is difficult to hack.
(b) It opens a terminal window through which commands can be given directly.
(c) It can create and run multiple virtual machines on a computer system.
(d) None of these.

Answer: (c) It can create and run multiple virtual machines on a computer system.


Q2. What are some of the features in Kali Linux?

(a) It is a secure operating system that has been designed as hack-proof.
(b) It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.
(c) It is a software distribution created by the company Kali Inc.
(d) None of these. 

Answer: (b) It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.


Q3. Which of the following statement(s) is/are true about passive reconnaissance?

(a) Information about the target is collected indirectly.
(b) Information about the target is collected directly.
(c) There is no direct communication with the target system.
(d) There is direct communication with the target system.

Answer: (a) Information about the target is collected indirectly.

(c) There is no direct communication with the target system.


Q4. Which of the following can be used for passive reconnaissance?

(a) Whois
(b) archive.org
(c) Netcraft
(d) Search engines

Answer: (a) Whois
(b) archive.org
(c) Netcraft
(d) Search engines


Q5. How host discovery can be carried out using ICMP sweep?

(a) The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
(b) It uses ICMP protocol to broadcast packets to all the machines in a network.
(c) It utilizes the vulnerability of TCT connection establishment.
(d) None of these.

Answer: (a) The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.


Q6. How does port scanning using TCP Connect works?

(a) It creates a half-open connection during TCP connection establishment, and decides whether the port is open.
(b) It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
(c) It drops TCP packets as they arrive from the target.
(d) None of these.

Answer: (b) It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.


Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?

(a) RST
(b) ACK
(c) SYN-ACK
(d) SYN

Answer: (d) SYN


Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?

(a) It allocates unique IP addresses to all operating systems.
(b) It allocates a virtual IP address to all operating systems.
(c) It allocates IP address of the HOST system to all operating systems.
(d) In this mode an operating system can access internet
(e) None of these.

Answer: (a) It allocates unique IP addresses to all operating systems.
(c) It allocates IP address of the HOST system to all operating systems.


Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?

(a) Whois
(b) archive.org
(c) Netcraft
(d) Search engines

Answer: (b) archive.org


Q10. Which of the following search operators can narrow down the search results to a specific website?

(a) inurl
(b) OR
(c) AND
(d) site
(e) filetype

Answer: (d) site


Q11. What is the purpose of the following NMAP command?
nmap –sn 192.55.70.110-120

(a) A trace sweep
(b) A ping scan
(c) A port scan
(d) None of these

Answer: (b) A ping scan


Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?

(a) An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
(b) An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
(c) An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
(d) An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Answer: (a) An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
(b) An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.


Q13. By default how many ports are scanned in nmap for a target system _________?

Answer: 1000


Q14. Which of the following options can be used for OS and Version detection?

(a) –sn
(b) -Pn
(c) -A
(d) –sT
(e) None of these

Answer: (c) -A


Q15. Which of the following nmap options can be used to carry out UDP scan?

(a) -sP
(b) -sS
(c) -sU
(d) None of these

Answer: (c) -sU


Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?

(a) -sn
(b) -p
(c) -Pn
(d) None of these

Answer: (b) -p


Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?

(a) -F
(b) -p20-100
(c) -p22, 23, 80, 8080
(d) None of these

Answer: (a) -F
(b) -p20-100
(c) -p22, 23, 80, 8080


Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?

(a) True
(b) False

Answer: (a) True


Q19. Can the use of firewall prevent port/host scanning?

(a) True
(b) False

Answer: (a) True


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

Cloud Computing NPTEL Assignment 4 Answers

Problem Solving Through Programming in C NPTEL Assignment Answers Week 4

Related Posts