Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Ethical Hacking Assignment 4 Answers 2023

NPTEL Ethical Hacking Assignment 4 Answers (WEEK 4)

Q1. Which of the following statement(s) is/are false?

Answer: b. Hypervisor allows one host system to support multiple virtual machines; however, it does not allow resource sharing.
d. Kali-linux is a hack-proof secured operating system.

1230+ students getting help from instant notifications, Join us on telegram.

Q2. Which of the following statement(s) is/are true about “Active Reconnaissance”?

Answer: b. Information about the target is collected directly.
c. There is a chance of detection in active reconnaissance.

Q3. Which of the following is not an information source over the internet for an attackers?

Answer: b. YouTube

Q4. Which of the following data cannot be retrieved about the target system/website using Whois database lookup?

Answer: d. History of the website.

Q5. Which of the following search operators can narrow down the search results to a site that has the
targeted search term in the URL?

Answer: a. inurl

Q6. Which of the following information can be retrieved using DNS/Mail server enumeration?

Answer: a. Usernames
b. Computer names
e. IP address of system

Q7. Which of the following statement(s) is/are true for host discovery using ICMP ECHO and ICMP non-ECHO sweep?

Answer: a. In ICMP sweep, the attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
c. In ICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is considered as down.

Q8. Which of the following option(s) is/are used for host discovery using TCP and UDP sweep respectively?

Answer: d. PS, PU
e. PA, PU

Q9. Which of the following information is retrieved by port scanning?

Answer: b. The services running on the target system.

Q10. What kind of packet is received if the target port is closed/filtered in TCP connect/SYN scan?

Answer: e. RST/ACK

Q11. Which of the following option(s) is/are used for OS and Version detection respectively?

Answer: C. O, -SV

Q12. How many ports are scanned in NMAP for a target system if we use -F option __?

Answer: 100

Q13. Which of the following NMAP scanning option(s) is/are correct with respect to port scanning?

Answer: a. -F

b. -p20
c. -p20-100
e. -p20, 22, 28, 80

Q14. If we want to disable host discovery in port scanning, then which of the following options can be used?

Answer: C. -Pn

Q15. Which of the following can be used to reconnaissance countermeasures?

Answer: f. All of these.

Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.

Also Available:

Ethical Hacking NPTEL Week 3 Answers

Related Posts