NPTEL Ethical Hacking Assignment 1 Answers 2023 :-
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
NPTEL Ethical Hacking Assignment 1 Answers 2023
Q1. In which of the following penetration testing models, no information about the network is given to tester ?
a. White box model.
b. Black box model.
c. Red box Model.
d. Gray box model.
e. None of these.
Q2. Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transter delay between a pair of nodes may depend on the prevailing network traffic.
d. The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection. e. It is efficient for bursty traffic.
Q3. 3. A 1000 byte packet is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 10 msec. The packet will reach the destination after____________ (Assume 1K = 1000) mse.
Q4. 4. Which of the following statement(s) is/are true for virtual circuit based packet transfer approach ?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. In this approach, each packets follows distinct path.
c. The intermediate node can perform dynamic routing.
d. All the packets reach in order to the destination. It is a true packet switched network.
Q5. 5. Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?
a. Session layer
b. Transport layer
c. Network layer
d. Datalink layer e. Physical layer
Q6. 6. Which of the following is/are false for TCP/IP model?
a. It allows cross-platform communications among heterogeneous networks.
b. Itis a scalable client-server architecture which allows network modification without disrupting the current services.
c. It can also represent any other protocol stack other than the TCP/IP suite such as Bluetooth connection.
d. None of these.
Q7. 7. Which of the following is true for the IP?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
c. It indicates how many hardware ports are there in the computer system.
d. None of these.
Q8. 8. How many bits are used for IP address (in IP version 4) and port number respectively?
c. 48, 8
d. 48, 16
Q9. 9. If a 2000 byte data message is sent using a IFTP, the corresponding Ethernet packet will be of Size_________ bytes.
Q10. If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field______?