Table of Contents
NPTEL Ethical Hacking Assignment 5 Answers (Week 5)
Q1. Which of the following tools can be used for scanning vulnerabilities?
a. Hypervisor
b. Nessus
c. Hydra
d. Nmap
Answer: b. Nessus
d. Nmap
Q2. Which of the following may be used for password cracking?
a. Dictionary attack.
b. Social engineering attack.
c. TCP SYN attack.
d. DoS attack.
Answer: a. Dictionary attack.
b. Social engineering attack.
Q3. Which of the following can be used for gaining higher privileges than existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. None of these.
Answer: a. Vertical privilege escalation.
Q4. Which of the following can self-replicate itself?
a. Trojan
b. Virus
c. Ransomware
d. All of these
Answer: b. Virus
Q5. Which of the following can be performed using the NMAP tool?
a. Identify open ports on a target system.
b. Identify the operating system that is running on a target system.
c. Identify the hosts available in a network.
d. Vulnerability available on a target system.
Answer: a. Identify open ports on a target system.
b. Identify the operating system that is running on a target system.
c. Identify the hosts available in a network.
d. Vulnerability available on a target system.
Q6. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?
a. nmap — script=script_name.nse
b. nmap — script script_name.nse
c. nmap -script script_name
d. nmap script name.nse
Answer: a. nmap — script=script_name.nse
b. nmap — script script_name.nse
c. nmap -script script_name
Q7. Which of the following http scripts can be used to detect if a target system is running a webserver?
a. http-methos
b. http-brute
c. http-slowloris-check
d. ftp-anon
Answer: a. http-methos
Q8. Which of the following approaches can be used to create a secure hacking environment?
a. Use of proxy tools/servers
b. Using kali Linux in a live mode
c. Use of MAC changer tool
d. Use of firewalls
e. None of these
Answer: a. Use of proxy tools/servers
c. Use of MAC changer tool
Q9. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a. ssh 10.0.0.1-l user
b. ssh 10.0.0.1-I user -p pwd
c. ssh 10.0.0.1 user pwd
d. ssh user@ 10.0.0.1
Answer: a. ssh 10.0.0.1-l user
d. ssh user@ 10.0.0.1
Q10. Which of the following approaches can be used to enumerate all user available in a target system?
a. Use of nmap script smb-enum-user
b. Hydra tool
c. Crunch tool
d. Enum4linux
Answer: a. Use of nmap script smb-enum-user
d. Enum4linux
Q11. Which of the following ports should be open on the target system to run a nmap script http-malware-host?
a. http
b. ssh
c. telnet
d. Dose not require any services to be running
Answer: a. http
Q12. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?
a. Client
b. Server
Answer: b. Server
Q13. Which of the following protocol(s) is/are not vulnerable to sniffing?
a. HTTP
b. Telnet
c. POP
d. HTTPS
e. SMTP
Answer: d. HTTPS
Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
a. True
b. False
Answer: a. True
Q15. Which of the following commands is used to see arp table in a system?
a. arp -a
b. arp -s
c. arp -i
d. arp -d
Answer: a. arp -a
Some More NPTEL Ethical Hacking Assignment Answers 2022
NPTEL Ethical Hacking Week 6 Assignment 6 Answers
NPTEL Ethical Hacking Week 4 Assignment 4 Answers
Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.
Also Available: