NPTEL Ethical Hacking Assignment 11 Answers 2022:-All the Answers are provided here to help the students as a reference, You must submit your assignment at your own knowledge.
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of the best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
NPTEL Ethical Hacking Assignment Answers 2022 | Answers |
Assignment 1 | Click Here |
Assignment 2 | Click Here |
Assignment 3 | Click Here |
Assignment 4 | Click Here |
Assignment 5 | Click Here |
Assignment 6 | Click Here |
Assignment 7 | Click Here |
Assignment 8 | Click Here |
Assignment 9 | Click Here |
Assignment 10 | Click Here |
Assignment 11 | Click Here |
Assignment 12 | Click Here |
NPTEL Ethical Hacking Assignment 11 Answers 2022:-
Q1. Which of the following Metasploit module can be used for vulnerability scanning and brute force attack?
a. Encoder
b. Payload
c. Exploit
d. Auxiliary
Answer:- d
Answers will be Uploaded Shortly and it will be Notified on Telegram, So JOIN NOW
Q2. To set port number of the target system in Metasploit framework, which of the following commands is used?
- a. Set LHOST
- b. Set RHOST
- c. Set RPORT
- d. Set LPORT
Answer: c
Q3. Which of the following is/are true for meterpreter shell?
- a. An interactive command shell (terminal) that helps to explore target system.
- b. A standard command shell (terminal) that helps to explore target system.
- c. We can use Metasploit modules and commands inside meterpreter shell.
- d. We cannot use Metasploit modules and command inside meterpreter shell.
Answer: a, b, c
Q4. Which of the following commands can be used for privilege escalation in Metasploit framework?
- a. getuid
- b. getsystem
- c. hashdump
- d. ps
Answer: b
Q5. To create a payload (backdoor), which parameters needs to be set in msfvenom module?
- a. Name of the payload
- b. IP of the target system
- c. IP of an attacker system
- d. Port of target system
- e. Port of an attacker system.
Answer: a, c, e
πFOR NEXT WEEK ASSIGNMENT ANSWERSπ
Q6.
a. SELECT * from USERS;
b. SELECT * from USERS where u_id = β5β
c. SELECT * from USERS where u_name = βanyβ
d. SELECT * from USERS where u_name = βanyβ or 1=1
Answer:- d
Q7. If any web page is vulnerable to blind sql injection then which of the following is true?
Answer: b
Q8. Which of the following tools is used to automate sql injection attacks?
Answer: c
Q9. Which of the following options can be used to extract the current user name in SQL MAP?
Answer: b
If there are any changes in answers will notify you on telegram so you can get a 100% score, So Join
Q10. Which of the following statement(s) is/are true for reflected XXS?
Answer: b
Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Ethical Hacking Assignment 11 Answers 2022:-All the Answers are provided here to help the students as a reference, You must submit your assignment at your own knowledge.