Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Ethical Hacking Assignment 8 Answers 2022

Are you looking for help in nptel ethical hacking assignment 8 answers? So, here in this article, we have provided ethical hacking week 8 assignment answer’s hint.

NPTEL Ethical Hacking Assignment 8 Answers (Week 8)

Q1. Which of the following statements correctly represents the term steganography?

a. Encrypting information so that it will not be legible to an unauthorized person.
b. Hiding information within some cover media file.
c. Secure way of communicating without sharing any key.
d. None of these.

Answer: b. Hiding information within some cover media file.

For instant notification of any updates, Join us on telegram.


Q2. Which of the following is/are not instances of behavioral biometrics?

a. Fingerprint

b. Signature

c. Gait

d. Iris scan

e. Retina scan

Answer: a. Fingerprint
d. Iris scan
e. Retina scan


Q3. Consider a color image of size 2000 x 2000, where each pixel is stored in 24-bits (containing red, green and blue components as 8-bits each). How many bytes of information can be hidden in the image by using LSB steganography technique? Assume that only the least significant bit in each 8-bit color component is modified.

a. 12,000,000 bytes

b. 8,000,000 bytes

c. 7,500,000 bytes

d. None of these.

Answer: d. None of these.


Q4. Which of the following statements is/are true in biometric systems?

a. For authentication application, a user template is compared against all possible templates stored in the database.

b. For verification / identification application, a user template is compared against a specific single template stored in the database.

c. They can provide 100% accuracy in security applications.

d. None of these.

Answer: d. None of these.


Q5. What is denial-of-service attack?

a. An attack on a system whereby stored files get modified or deleted.

b. An attack that prevents legitimate users from accessing some service.

c. An attack that destroys the stored password information in a system.

d. None of these.

Answer: b. An attack that prevents legitimate users from accessing some service.


Q6. How does a Smurf denial-of-service attack work?

a. A ping request is sent from the victim machine to a broadcast address.

b. The attacker sends a large number of ICMP ping messages to the victim machine.

c. It exploits a vulnerability in the TCP connection establishment process.

d. None of these.

Answer: d. None of these.


Q7. Which of the following attacks rely on the accumulation of TCP half-open connections on the server?

a. Ping of death attack.

b. SYN flooding attack.

c. Smurf attack.

d. None of these.

Answer: b. SYN flooding attack.


Q8. Which of the following is/are true for Botnet?

a. A large number of Botnets are often used to attack a victim machine.

b. It is a malicious software that spreads from one machine to another.

c. It can be used to mount distributed denial-of-service attack.

d. All of these.

Answer: a. A large number of Botnets are often used to attack a victim machine.
c. It can be used to mount distributed denial-of-service attack.


Q9. What is meant by recursive name resolution?

a. A host may have to send multiple DNS requests to several DNS servers.

b. A host sends a single DNS request to its next higher-level DNS server.

c. Name resolution happens recursively within the host itself.

d. All of these.

Answer: b. A host sends a single DNS request to its next higher-level DNS server.


Q10. How does PGP provide security in email transmission?

a. It provides authentication.

b. It provides non-repudiation.

c. It ensures availability.

d. All of these.

Answer: a. It provides authentication.


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

An Introduction to Artificial Intelligence NPTEL Assignment Answers Week 8

Related Posts