NPTEL Ethical Hacking Assignment 10 Answers 2022

NPTEL Ethical Hacking Assignment 10 Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Assignment Answers 2022Answers
Assignment 1Click Here
Assignment 2Click Here
Assignment 3Click Here
Assignment 4Click Here
Assignment 5Click Here
Assignment 6Click Here
Assignment 7Click Here
Assignment 8Click Here
Assignment 9Click Here
Assignment 10Click Here
Assignment 11Click Here
Assignment 12NA

NPTEL Ethical Hacking Assignment 10 Answers 2022:-

Q1. Which of the following are examples of hardware-based attacks?

a. Side-channel attack. 
b. Physical probing. 
c. Denial of service stack. 
d. SQL injection attack

Answer:- a, b

Answers will be Uploaded Shortly and it will be Notified on Telegram, So JOIN NOW

NPTEL Ethical Hacking Assignment 10 Answers 2022

Q2. Which of the following statement(s) is/are false for side channel attacks?

  • a. They exploit weaknesses in cryptographic algorithms. 
  • b. They exploit weaknesses in algorithm implementations.
  • c. They do not require physical access to the device. 
  • d. None of these.

Answer: a

Q3. Which of the following are typically exploited in side-channel attacks?

a. Time required to carry out some computation. 
b. Encrypted ciphertexts for a number of given plaintext messages. 
c. Birthday attack of the hash function used. 
d. Variation in power consumption during computation. 
e. All of these

Answer: a, d

Q4. For modular exponentiation computation of x25, how many squaring and multiplication operations would be required?

  • a. 4 and 4. 
  • b. 4 and 2. 
  • c. 3 and 4. 
  • d. 5 and 2. 
  • e. 5 and 3.

Answer: b

Q5. Which of the following is/are true for differential power analysis?

  • a. It requires a single measurement. 
  • b. It requires multiple measurements. 
  • c. It is more effective than simple power analysis. 
  • d. It is less effective than simple power analysis.

Answer: b, c

👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇

NPTEL Ethical Hacking Assignment 10 Answers 2022

Q6. Which of the following can prevent power analysis attacks?

  • a. The computation times in the different branches of an “if” statement must be unequal. 
  • b. The computation times in the different branches of an “if” statement must be the same. 
  • c. Package the chip in a tamper-proof casing. 
  • d. All of these.

Answer:- c

Q7. What is the full form of PUF?

Answer: d

Q8. Which of the following is/are true for a PUF?

Answer: For Answer Click Here

Q9. What is a hardware Trojan?

Answer: b

If there are any changes in answers will notify you on telegram so you can get a 100% score, So Join

Q10. Which of the following types of PUF can be used?

Answer: a, b

Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:- CLICK HERE

Join Our Telegram:- CLICK HERE

NPTEL Ethical Hacking Assignment 10 Answers 2022:-All the Answers are provided here to help the students as a reference, You must submit your assignment at your own knowledge. NPTEL Ethical Hacking Assignment 10 Answers 2022

Leave a Comment