NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Assignment Answers 2022Answers
Assignment 1Click Here
Assignment 2Click Here
Assignment 3Click Here
Assignment 4Click Here
Assignment 5Click Here
Assignment 6NA
Assignment 7NA
Assignment 8NA
Assignment 9NA
Assignment 10NA
Assignment 11NA
Assignment 12NA

NPTEL Ethical Hacking Week 4 Assignment Answers 2023

Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.

Answer:- c

Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.

Answer:- For Answer Click Here

Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra

Answer:- 

Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.

Answer:- For Answer Click Here

Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these

Answer:- 

Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.

Answer:- For Answer Click Here

Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these

Answer:- 

Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU

Answer:- For Answer Click Here

Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN

Answer:- 

Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN

Answer:- For Answer Click Here

Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Answer:- 

Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False

Answer:- For Answer Click Here

Q13. By default how many ports are scanned in MAP for a target system

Answer:- 

Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.

Answer:- For Answer Click Here

Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these

Answer:- 

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:-

Q1. What is the purpose of the Hypervisor software?

a. It is a secure software layer that is difficult to hack.
b. It opens a terminal window through which commands can be given directly.
c. It can create and run multiple virtual machines on a computer system.
d. None of these.

Answer:- c. It can create and run multiple virtual machines on a computer system.

Q2. What are some of the features in Kali Linux?

a. It is a secure operating system that has been designed as hack-proof.
b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.
c. It is a software distribution created by the company Kali Inc.
d. None of these.

👇FOR NEXT WEEK ASSIGNMENT 5 ANSWERS👇

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

Answer:- b. It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.

Q3. Which of the following statement(s) is/are true about passive reconnaissance?

a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is no direct communication with the target system.
d. There is direct communication with the target system.

Answer:- (A) & (C)

Q4. Which of the following can be used for passive reconnaissance?

a. Whois
b. archive.org
c. Netcraft
d. Search engines

Answer:- (A), (B), (C), (D)

Q5. How host discovery can be carried out using ICMP sweep?

a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
b. It uses ICMP protocol to broadcast packets to all the machines in a network.
c. It utilizes the vulnerability of TCT connection establishment.
d. None of these.

Answer:- a. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.

Q6. How does port scanning using TCP Connect works?

a. It creates a half-open connection during TCP connection establishment, and decides whether the port is open.
b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
c. It drops TCP packets as they arrive from the target.
d. None of these.

Answer:- b. It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.

Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?

a. RST
b. ACK
c. SYN-ACK
d. SYN

Answer:- d. SYN

Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?

a. It allocates unique IP addresses to all operating systems.
b. It allocates a virtual IP address to all operating systems.
c. It allocates IP address of the HOST system to all operating systems.
d. In this mode an operating system can access internet
e. None of these.

Note:- We are going to post answers of all weeks you can join us on telegram for quick updates and if there are any changes in answers then will update on our telegram channel only.

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

Answer:- a,c

Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?

a. Whois
b. archive.org
c. Netcraft
d. Search engines

Answer:- b. archive.org

Q10. Which of the following search operators can narrow down the search results to a specific website?

a. inurl
b. OR
c. AND
d. site
e. filetype

Answer:- For Answer Click Here

Q11. What is the purpose of the following NMAP command?
nmap –sn 192.55.70.110-120

a. A trace sweep
b. A ping scan
c. A port scan
d. None of these

Answer:- b. A ping scan

Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?

a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
c. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Answer:- (A), (B)

Q13. By default how many ports are scanned in nmap for a target system ………….?

Answer:- 1000

Q14. Which of the following options can be used for OS and Version detection?

a. –sn
b. -Pn
c. -A
d. –sT
e. None of these

Answer:- c. -A

Q15. Which of the following nmap options can be used to carry out UDP scan?

a. -sP
b. -sS
c. -sU
d. None of these

👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

Answer:- c. -sU

Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?

a. -sn
b. -p
c. -Pn
d. None of these

Answer:- For Answer Click Here

Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?

a. -F
b. -p20-100
c. -p22, 23, 80, 8080
d. None of these

Answer:- (A), (B), (C)

Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?

a. True
b. False

Answer:- a. True

Q19. Can the use of firewall prevent port/host scanning?

a. True
b. False

Answer:- a. True

👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023

Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:- CLICK HERE

Join Our Telegram:- CLICK HERE

NPTEL Ethical Hacking Assignment 4 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

4 thoughts on “NPTEL Ethical Hacking Assignment 4 Quiz Answers 2023”

Leave a Comment