NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
NPTEL Ethical Hacking Assignment Answers 2022 | Answers |
Assignment 1 | Click Here |
Assignment 2 | Click Here |
Assignment 3 | Click Here |
Assignment 4 | Click Here |
Assignment 5 | Click Here |
Assignment 6 | Click Here |
Assignment 7 | Click Here |
Assignment 8 | NA |
Assignment 9 | NA |
Assignment 10 | NA |
Assignment 11 | NA |
Assignment 12 | NA |
NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022:-
Q1. Which of the following tools can be used for scanning vulnerabilities?
a. Hypervisor
b. Nessus
c. Hydra
d. Nmap
Answer:- b,d
Q2. Which of the following may be used for password cracking?
a. Dictionary attack.
b. Social engineering attack.
c. TCP SYN attack.
d. DoS attack.
Answer:- a,b
Q3. Which of the following can be used for gaining higher privileges than existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. None of these.
Answer:- a
Q4. Which of the following can self-replicate itself?
a. Trojan
b. Virus
c. Ransomware
d. All of these
Answer:- b
👇FOR NEXT WEEK: ASSIGNMENT 6 ANSWERS👇
Q5. Which of the following can be performed using the NMAP tool?
a. Identify open ports on a target system.
b. Identify the operating system that is running on a target system.
c. Identify the hosts available in a network.
d. Vulnerability available on a target system.
Answer:- a,b,c,d
Q6. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?
a. nmap — script=script_name.nse
b. nmap — script script_name.nse
c. nmap — script script_name
d. nmap script_name.nse
Answer:- a,b,c
Q7. Which of the following http scripts can be used to detect if a target system is running a webserver?
a. http-methos
b. http-brute
c. http-slowloris-check
d. ftp-anon
Answer:- a
Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.
Q8. Which of the following approaches can be used to create a secure hacking environment?
a. Use of proxy tools/servers
b. Using kali Linux in a live mode
c. Use of MAC changer tool
d. Use of firewalls
e. None of these
Answer:- a, c
Q9. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a. ssh 10.0.0.1 -l user
b. ssh 10.0.0.1 -l user -p pwd
c. ssh 10.0.0.1 user pwd
d. ssh user@10.0.0.1
Answer:- a, d
Q10. Which of the following approaches can be used to enumerate all user available in a target system?
a. Use of nmap script smb-enum-user
b. Hydra tool
c. Crunch tool
d. Enum4linux
Answer:- a,d
Q11.Which of the following ports should be open on the target system to run a nmap script http-malware-host?
a. HTTP
b. ssh
c. telnet
d. Dose not require any services to be running
Answer:- For Answer Click Here
Q12. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?
a. Client
b. Server
Answer:- b
Q13. Which of the following protocol(s) is/are not vulnerable to sniffing?
a. HTTP
b. Telnet
c. POP
d. HTTPS
e. SMTP
Answer:- d
Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
a. True
b. False
Answer:- For Answer Click Here
Q15. Which of the following commands is used to see arp table in a system?
a. arp -a
b. arp -s
c. arp -i
d. arp -d
Answer:- a
👇FOR NEXT WEEK: ASSIGNMENT 6 ANSWERS👇
Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Ethical Hacking Assignment 6 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
3 thoughts on “NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022”