Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Sorry, you do not have permission to ask a question, You must login to ask a question.

SIKSHAPATH Latest Articles

NPTEL Ethical Hacking Assignment 3 Answers 2023

NPTEL Ethical Hacking Assignment 3 Answers 2023

NPTEL Ethical Hacking: Ethical hacking is the practice of testing the security of IT systems by simulating malicious attacks. Ethical hackers use the same tools and techniques as malicious hackers, but with the system owners’ permission and consent. Ethical hacking can assist individuals and organizations to identify and fix vulnerabilities, prevent data breaches, and enhance their security posture.

This course covers the fundamentals of ethical hacking, such as networking, network security, and cryptography. It also covers various types of attacks, such as web application attacks, wireless attacks, social engineering attacks, and password cracking attacks. The course demonstrates how to perform and defend against these attacks using various tools and frameworks. The participants can practice their skills by replicating the demonstration experiments on their systems.

This course is designed for students and professionals in the fields of computer science and engineering, information technology, electronics and communication, and electrical engineering. The participants should have basic knowledge of programming and networking concepts.

Course NameNPTEL Ethical Hacking
Course Duration12 weeks
Course Start Date24 Jul 2023
Course End Date13 Oct 2023
Exam Date28 Oct 2023
Course LinkClick Here

NPTEL Ethical Hacking Assignment 3 Answers

1. Consider the following statements:
(i) In connection-oriented approach, network layer first makes a connection.
(ii) IP protocol uses connection-oriented routing
a.Only (i) is true
b.Only (ii) is true
c.Both (i) and (ii) are true.
d.Both (i) and (ii) are false

Answer: a. Only (i) is true

2. a & b.

3. a & c

4. a

5. a & d

6. c

7. e

8. b

9. a

10. b

NPTEL Ethical Hacking Assignment 2 Answers

1.Why there is a need for fragmentation of IP packets?

Answer: A. Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.

1000+ students getting help from instant notifications, Join us on telegram.


2.

Answer: B. In transparent fragmentation, it is required to route all packet to the same exit router in a network.

C. In non-transparent fragmentation, each fragment is treated as an independent packet.


3. An IP packet arrives at the final destination with the M flag set as 1. Which of the following statement is true about the packet?

Answer: C. The packet represents a fragment of a larger packet.


4.

Answer: C. IP address consists of three logical parts: network number, host number and port number.


5. Which address classes do the IP addresses 144.16.75.12 and 10.10.85.120 belong to?

Answer: C. Class B and Class A


6. Which of the following IP addresses represent broadcast address?

Answer: A. 144.15.255.255
D. 202.0.255.255


7. The maximum number of hosts that are possible in a class C network is

Answer: 254


8. What is a TCP half-open connection in the context of connection establishment using 3-way handshake?

Answer: D. The last transaction does not complete.


9. In the TCP header field, what do SYN=1 and ACK=0 represent

Answer: A. Connection request message.


10. What is the subnet address if the destination IP address is 144.16.75.105 and the subnet mask is 255.255.240.0?

Answer: D. None of these.

 

NPTEL Ethical Hacking Assignment 1 Answers

1.Which of the following point(s) is/are true for an ethical hacker?
A.An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition.
B.An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss.
C.An ethical hacker is not concerned with improving the organization’s security
posture.
D.None of these

Answer: D. None of these

1000+ students getting help from instant notifications, Join us on telegram.


2.Which of the following statement(s) is/are true?
A.In the black box model, the tester has complete information about the network.
B.In the white box model, the tester does not have any information about the network.
C.In the gray box model, the tester has partial information about the network.
D.None of these

Answer: C. In the gray box model, the tester has partial information about the network.


3.Which of the following statement(s) is/are false for a packet switched network?
A.A communication link can be shared by more than one connection.
B.A communication link is dedicated to a connection and cannot be shared with other connections.
C.It is efficient for bursty traffic.
D.The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.

Answer: B. A communication link is dedicated to a connection and cannot be shared with other connections.


4.Which of the following statement(s) is/are true for datagram-based packet transfer approach?
A.It is a connection-less packet switching approach, where no route is established priori to transfer of packets.
B.In this approach, each packet is transmitted as an independent entity.
C.In this approach each intermediate node can perform dynamic routing.
D.In this approach all the packets reach in order to the destination.

Answer: Option A, B and C.


5.What is the purpose of the port number in TCP/IP networks?
A.It uniquely identifies a network interface of a computer system.
B.It uniquely identifies a host in the network.
C.It uniquely identifies a running application on a specific host in the network.
D.It indicates how many hardware ports are there in the computer system.
E.None of these.

Answer: C. It uniquely identifies a running application on a specific host in the network.


6.Which of the following is not a valid port numbers in TCP/IP?
A.21
B.80
C.443
D.8080
E.80800

Answer: E. 80800


7.Which of the following functionality does Address Resolution Protocol (ARP) perform?
A.Map IP addresses to hardware (MAC) addresses.
B.Map hardware addresses (MAC) to IP addresses.
C.Performs error control and correction.
D.Breaks the packet into smaller packets, if required.

Answer: A. Map IP addresses to hardware (MAC) addresses.


8.Which of the following statement(s) is/are false?
A.IP provides connectionless, unreliable delivery systems for packets.
B.UDP provides connectionless, unreliable delivery systems for packets.
C.TCP provides connectionless, unreliable delivery systems for packets.
D.None of these.

Answer: C. TCP provides connectionless, unreliable delivery systems for packets.


9. If the IP header is 96 bits long, what will be the value (in decimal) of the “HLEN” field

Answer: 3


10. The maximum size of data that can be accommodated in an IP datagram is _______ bytes.

Answer: 65535


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

NPTEL Ethical Hacking Assignment 5 Answers

Related Posts

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock