Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Ethical Hacking Assignment 9 Answers 2022

Are you looking for any help in nptel ethical hacking assignment 9 answers? So, in this article, we have covered ethical hacking week 9 assignment answer’s hint.

About Ethical Hacking

When we talk about the term ‘hacking’ it seems to be the negative or threatening part of the digital world. But, Ethical Hacking is the authorised hacking by the owner of that target system. It is preferred due to defend the system from hackers who came with malicious intentions. In Ethical Hacking, bypassing or cracking security measures implemented by system to find out vulnerabilities.

Why You Should Learn Ethical Hacking

Ethical Hacker’s demand is very high in this digital world because as much as the digital transactions of data are increasing, the number of cyber attacks and hacking is also increasing. So, every reputated company required the support of Ethical Hackers to protect their data and data transactions.

NPTEL Ethical Hacking Assignment 9 Answers (Week 9)

Q1.

[qdeck]

[i] Why do packet sniffers require the network interface card (NIC) to be put in promiscuous mode?

a. So that broadcast packets can be sent to the victim machine.

b. So that all packets crossing the NIC can be read.

c. So that headers of encrypted packets can be deciphered.

d. None of these.

[start]

[q unit=”9″ topic=”Ethical_Hacking”] Why do packet sniffers require the network interface card (NIC) to be put in promiscuous mode?

a. So that broadcast packets can be sent to the victim machine.

b. So that all packets crossing the NIC can be read.

c. So that headers of encrypted packets can be deciphered.

d. None of these.

[a] Answer: b. So that all packets crossing the NIC can be read.

[/qdeck]

For assignment 10 answers, Join us on telegram.


Q2. Which of the following measures can prevent packet sniffing on a network segment?

a. Restrict physical access to the network by unauthorized persons.
b. Install the latest version of TCP protocol that does not contain vulnerabilities.
c. Use encryption to protect confidential information.
d. All of these.

Answer: d. All of these.


Q3. How can NMAP detect whether network sniffing is probably going on in a network?

a. By sending a NMAP ping request to all the machines on the network.
b. By conducting TCP stealth scan on all the machines in the network.
c. By using a script that checks whether any of the machines has the network card configured in the promiscuous mode.
d. None of these.

Answer: c. By using a script that checks whether any of the machines has the network card configured in the promiscuous mode.


Q4. Which of the following features are present in Ettercap?

a. IP-based and MAC-based filtering.
b. Character injection.
c. Packet filtering and dropping.
d. SQL injection.

e. All of these.

Answer: a. IP-based and MAC-based filtering.
b. Character injection.
c. Packet filtering and dropping.


Q5. Which of the following can be used for computer-based social engineering attack?

a. Tailgating.
b. Sending out chain letter emails.
c. An illegitimate email falsely claiming to be from a legitimate site.
d. Reverse social engineering.

Answer: a. Tailgating.
b. Sending out chain letter emails.
c. An illegitimate email falsely claiming to be from a legitimate site.


Q6. Which of the following tools can be used to put the NIC in promiscuous mode?

a. macchanger
b. dnsenum
c. slowloris
d. arpspoof

Answer: d. arpspoof


Q7. Which of the following protocols are vulnerable to sniffing attack?

a. HTTP
b. FTP
c. HTTPS
d. SSL

Answer: a. HTTP
b. FTP


Q8. How does Slowloris work?

a. It sends a single large packet to victim system.
b. It sends multiple HTTP requests to the victim system but never completes the request.
c. It mounts MAC attack on target system.
d. It turns on NIC of the system in promiscuous mode.

Answer: b. It sends multiple HTTP requests to the victim system but never completes the request.


Q9. Which of the following is/are example(s) of bandwidth flood?

a. ICMP flood
b. SYN flood
c. MAC Flood

Answer: a. ICMP flood
b. SYN flood


Q10. For mounting DoS attack using hping3 tool what option can be used as an alternative of –i u10000?

a. –count
b. –fast
c. –faster
d. –flood

Answer: b. –fast


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.

Related Posts