NPTEL Ethical Hacking Assignment 2 Quiz Answers 2023

NPTEL Ethical Hacking Assignment 2 Quiz Answers 2023:-All the Answers provided below to help the students as a reference, You must submit your assignment at your own knowledge.

NPTEL Ethical Hacking Week 2 Assignment Answers 2023

1. Why there is a need for fragmentation of IP packets?

a. Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.
b. Fragmentation is necessary for faster data transfer.
c. Fragmentation is necessary for error-recovery and flow control.
d. All of these.

Answer :- a.) Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.

IP fragmentation occurs when a large IP packet needs to be transmitted over a network that has a smaller Maximum Transmission Unit (MTU) size. Different networks and technologies have varying MTU sizes due to factors like link-layer protocols and network infrastructure. If an IP packet is larger than the MTU of a particular network segment, it needs to be divided into smaller fragments to ensure successful transmission across that network.

2. Which of the following statements) is/are true?

a. In transparent fragmentation the subsequent networks are aware that the fragmentation had occurred.
b. In transparent fragmentation, it is required to route all packet to the same exit router in a network.
c. In non-transparent fragmentation, each fragment is treated as an independent packet.
d. In non-transparent fragmentation, an exit router reassembles all fragmented packets.

Answer :- b. In transparent fragmentation, it is required to route all packet to the same exit router in a network. 

c. In non-transparent fragmentation, each fragment is treated as an independent packet.

3. An IP packet arrives at the final destination with the M flag set as 1. Which of the following statement is true about the packet?

a. Prevents the fragmentation from taking place.
b. The packet will be fragmented by the next router.
c. The packet represents a fragment of a larger packet.
d. None of these.

Answer :- c. The packet represents a fragment of a larger packet.

4. Which of the following statements) is/are false for IP address?

a. IP address is 32-bit quantity.
b. IP address is typically expressed as dotted decimal notation where dots are used to separate each of the four octets of the address.
c. IP address consists of three logical parts: network number, host number and port number.
d. None of these.

Answer :- c. IP address consists of three logical parts: network number, host number and port number.

5. Which address classes do the IP addresses 144.16.75.12 and 10.10.85.120 belong to?

a. Class C and Class A
b. Class B and Class C
c. Class B and Class A
d. Class B and Class D

Answer :- c. Class B and Class A 

6. Which of the following IP addresses represent broadcast address?

а. 144.15.255.255
b. 144.16.0.255
c. 202.0.255.250
d. 202.0.255.255

Answer :- a, d

7. The maximum number of hosts that are possible in a class C network is_________.

Answer :- 254

8. What is a TCP half-open connection in the context of connection establishment using 3-way handshake?

a. The first transaction does not complete.
b. The second transaction does not complete.
c. The first transaction does not complete but the second transaction completes.
d. The last transaction does not complete.
e. None of these.

Answer :- d

9. In the TCP header field, what do SYN=1 and ACK=0 represent?

a. Connection request message.
b. Connection confirmation message.
c. Reject connection request.
d. Reset connection request.

Answer :- a

10. What is the subnet address if the destination IP address is 144.16.75.105 and the subnet mask is 255.255.240.0?

a. 144.16.32.0
b. 144.16.75.0
c. 144.16.16.0
d. None of these

Answer :- d

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Assignment Answers 2022Answers
Assignment 1Click Here
Assignment 2Click Here
Assignment 3Click Here
Assignment 4NA
Assignment 5NA
Assignment 6NA
Assignment 7NA
Assignment 8NA
Assignment 9NA
Assignment 10NA
Assignment 11NA
Assignment 12NA

NPTEL Ethical Hacking Assignment 2 Quiz Answers 2022

Q1. An IP packet arrives at a router with the first eight bits as 01001101. How many bytes are there in the OPTIONS field? 

a. 4 
b. 8 
c. 12 
d. 16 
e. None of these

Answer:- e. None of these

For Next Week Assignment Answers

NPTEL Ethical Hacking Assignment 2 Quiz Answers 2023

Q2. In an IP packet, the value of HLEN is 8, and the value of the TOTAL LENGTH field is 1500 (in decimal). The number of data bytes in the packet will be ________

Answer:- 1468

Q3. An IP packet arrives at the final destination with the M flag set as 1. Which of the following statement(s) is/are true about the packet? 

a. The packet represents a fragment of a larger packet. 
b. The packet will be fragmented by the next router. 
c. The packet is the first of multiple fragments. 
d. None of these.

Answer:- (A) & (C)

Q4. Which address classes do the IP addresses 144.16.75.12 and 10.10.85.120 belong to? 

a. Class C and Class A 
b. Class B and Class C 
c. Class B and Class A 
d. Class B and Class D

Answer:- c. Class B and Class A

Q5. Which of the following IP addresses represent broadcast address? 

a. 144.16.255.255 
b. 144.16.0.255 
c. 202.0.255.0 
d. 202.0.255.255

Answer:- (A) & (D)

Q6. What happens when an IP packet gets fragmented? 

a. The total number of bits transmitted over the network decreases. 
b. The total number of bits transmitted over the network increases. 
c. The total number of bits transmitted over the network remains the same as compared to the non-fragmented case. 
d. None of these.

Answer:- b. The total number of bits transmitted over the network increases. 

Q7. The maximum number of hosts that are possible in a class B network is _______

Answer:- 65534

Q8. What is the purpose of the port number field in the TCP header? 

a. It indicates the sequence number of the message. 
b. In indicates the hardware port of the destination host. 
c. It indicates the hardware port of the source host. 
d. None of these.

Answer:- d. None of these.

Q9. What is the subnet address if the destination IP address is 144.16.75.105 and the subnet mask is 255.255.240.0? 

a. 144.16.32.0 
b. 144.16.75.0 
c. 144.16.16.0 
d. None of these

Answer:- For Answer Click Here

Q10. What is a TCP half-open connection in the context of connection establishment using 3-way handshake? 

a. The first transaction does not complete. 
b. The second transaction does not complete. 
c. The first transaction does not complete but the second transaction completes. 
d. The last transaction does not complete. 
e. None of these.

Answer:- d. The last transaction does not complete.

For Next Week Assignment Answers

NPTEL Ethical Hacking Assignment 2 Quiz Answers 2023

Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:- CLICK HERE

Join Our Telegram:- CLICK HERE

NPTEL Ethical Hacking Assignment 2 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.