NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
NPTEL Ethical Hacking Assignment Answers 2022 | Answers |
Assignment 1 | Click Here |
Assignment 2 | Click Here |
Assignment 3 | Click Here |
Assignment 4 | Click Here |
Assignment 5 | Click Here |
Assignment 6 | NA |
Assignment 7 | NA |
Assignment 8 | NA |
Assignment 9 | NA |
Assignment 10 | NA |
Assignment 11 | NA |
Assignment 12 | NA |
NPTEL Ethical Hacking Week 4 Assignment Answers 2023
Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.
Answer:- c
Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Answer:- For Answer Click Here
Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra
Answer:-
Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.
Answer:- For Answer Click Here
Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these
Answer:-
Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.
Answer:- For Answer Click Here
Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these
Answer:-
Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU
Answer:- For Answer Click Here
Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:-
Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- For Answer Click Here
Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer:-
Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False
Answer:- For Answer Click Here
Q13. By default how many ports are scanned in MAP for a target system
Answer:-
Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.
Answer:- For Answer Click Here
Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these
Answer:-
NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:-
Q1. What is the purpose of the Hypervisor software?
a. It is a secure software layer that is difficult to hack.
b. It opens a terminal window through which commands can be given directly.
c. It can create and run multiple virtual machines on a computer system.
d. None of these.
Answer:- c. It can create and run multiple virtual machines on a computer system.
Q2. What are some of the features in Kali Linux?
a. It is a secure operating system that has been designed as hack-proof.
b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.
c. It is a software distribution created by the company Kali Inc.
d. None of these.
👇FOR NEXT WEEK ASSIGNMENT 5 ANSWERS👇
Answer:- b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.
Q3. Which of the following statement(s) is/are true about passive reconnaissance?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is no direct communication with the target system.
d. There is direct communication with the target system.
Answer:- (A) & (C)
Q4. Which of the following can be used for passive reconnaissance?
a. Whois
b. archive.org
c. Netcraft
d. Search engines
Answer:- (A), (B), (C), (D)
Q5. How host discovery can be carried out using ICMP sweep?
a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
b. It uses ICMP protocol to broadcast packets to all the machines in a network.
c. It utilizes the vulnerability of TCT connection establishment.
d. None of these.
Answer:- a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
Q6. How does port scanning using TCP Connect works?
a. It creates a half-open connection during TCP connection establishment, and decides whether the port is open.
b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
c. It drops TCP packets as they arrive from the target.
d. None of these.
Answer:- b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- d. SYN
Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?
a. It allocates unique IP addresses to all operating systems.
b. It allocates a virtual IP address to all operating systems.
c. It allocates IP address of the HOST system to all operating systems.
d. In this mode an operating system can access internet
e. None of these.
Note:- We are going to post answers of all weeks you can join us on telegram for quick updates and if there are any changes in answers then will update on our telegram channel only.
Answer:- a,c
Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?
a. Whois
b. archive.org
c. Netcraft
d. Search engines
Answer:- b. archive.org
Q10. Which of the following search operators can narrow down the search results to a specific website?
a. inurl
b. OR
c. AND
d. site
e. filetype
Answer:- For Answer Click Here
Q11. What is the purpose of the following NMAP command?
nmap –sn 192.55.70.110-120
a. A trace sweep
b. A ping scan
c. A port scan
d. None of these
Answer:- b. A ping scan
Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
c. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer:- (A), (B)
Q13. By default how many ports are scanned in nmap for a target system ………….?
Answer:- 1000
Q14. Which of the following options can be used for OS and Version detection?
a. –sn
b. -Pn
c. -A
d. –sT
e. None of these
Answer:- c. -A
Q15. Which of the following nmap options can be used to carry out UDP scan?
a. -sP
b. -sS
c. -sU
d. None of these
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Answer:- c. -sU
Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?
a. -sn
b. -p
c. -Pn
d. None of these
Answer:- For Answer Click Here
Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?
a. -F
b. -p20-100
c. -p22, 23, 80, 8080
d. None of these
Answer:- (A), (B), (C)
Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?
a. True
b. False
Answer:- a. True
Q19. Can the use of firewall prevent port/host scanning?
a. True
b. False
Answer:- a. True
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
4 thoughts on “NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023”