Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Ethical Hacking Assignment 5 Answers 2022

NPTEL Ethical Hacking Assignment 5 Answers (Week 5)

Q1. Which of the following tools can be used for scanning vulnerabilities?

a. Hypervisor
b. Nessus
c. Hydra
d. Nmap

Answer: b. Nessus
d. Nmap


Q2. Which of the following may be used for password cracking?

a. Dictionary attack.

b. Social engineering attack.

c. TCP SYN attack.

d. DoS attack.

Answer: a. Dictionary attack.
b. Social engineering attack.


Q3. Which of the following can be used for gaining higher privileges than existing one?

a. Vertical privilege escalation.

b. Horizontal privilege escalation.

c. Diagonal privilege escalation.

d. None of these.

Answer: a. Vertical privilege escalation.


Q4. Which of the following can self-replicate itself?

a. Trojan

b. Virus

c. Ransomware

d. All of these

Answer: b. Virus


Q5. Which of the following can be performed using the NMAP tool?

a. Identify open ports on a target system.

b. Identify the operating system that is running on a target system.

c. Identify the hosts available in a network.

d. Vulnerability available on a target system.

Answer: a. Identify open ports on a target system.
b. Identify the operating system that is running on a target system.
c. Identify the hosts available in a network.
d. Vulnerability available on a target system.


Q6. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?

a. nmap — script=script_name.nse

b. nmap — script script_name.nse

c. nmap -script script_name

d. nmap script name.nse

Answer: a. nmap — script=script_name.nse
b. nmap — script script_name.nse
c. nmap -script script_name


Q7. Which of the following http scripts can be used to detect if a target system is running a webserver?

a. http-methos

b. http-brute

c. http-slowloris-check

d. ftp-anon

Answer: a. http-methos


Q8. Which of the following approaches can be used to create a secure hacking environment?

a. Use of proxy tools/servers

b. Using kali Linux in a live mode

c. Use of MAC changer tool

d. Use of firewalls

e. None of these

Answer: a. Use of proxy tools/servers
c. Use of MAC changer tool


Q9. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?

a. ssh 10.0.0.1-l user

b. ssh 10.0.0.1-I user -p pwd

c. ssh 10.0.0.1 user pwd

d. ssh user@ 10.0.0.1

Answer: a. ssh 10.0.0.1-l user
d. ssh user@ 10.0.0.1


Q10. Which of the following approaches can be used to enumerate all user available in a target system?

a. Use of nmap script smb-enum-user

b. Hydra tool

c. Crunch tool

d. Enum4linux

Answer: a. Use of nmap script smb-enum-user
d. Enum4linux


Q11. Which of the following ports should be open on the target system to run a nmap script http-malware-host?

a. http

b. ssh

c. telnet

d. Dose not require any services to be running

Answer: a. http


Q12. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?

a. Client

b. Server

Answer: b. Server


Q13. Which of the following protocol(s) is/are not vulnerable to sniffing?

a. HTTP

b. Telnet

c. POP

d. HTTPS

e. SMTP

Answer: d. HTTPS


Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.

a. True

b. False

Answer: a. True


Q15. Which of the following commands is used to see arp table in a system?

a. arp -a

b. arp -s

c. arp -i

d. arp -d

Answer: a. arp -a


Some More NPTEL Ethical Hacking Assignment Answers 2022

NPTEL Ethical Hacking Week 6 Assignment 6 Answers

NPTEL Ethical Hacking Week 4 Assignment 4 Answers


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

Artificial Intelligence NPTEL Assignment Answers Week 5

Data Science for Engineers Week 5 NPTEL Assignment Answers

Related Posts