NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022

NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Assignment Answers 2022Answers
Assignment 1Click Here
Assignment 2Click Here
Assignment 3Click Here
Assignment 4Click Here
Assignment 5Click Here
Assignment 6Click Here
Assignment 7Click Here
Assignment 8NA
Assignment 9NA
Assignment 10NA
Assignment 11NA
Assignment 12NA

NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022:-

Q1. Which of the following tools can be used for scanning vulnerabilities?

a. Hypervisor 
b. Nessus 
c. Hydra 
d. Nmap

Answer:- b,d

Q2. Which of the following may be used for password cracking?

a. Dictionary attack. 
b. Social engineering attack. 
c. TCP SYN attack. 
d. DoS attack.

Answer:- a,b

Q3. Which of the following can be used for gaining higher privileges than existing one?

a. Vertical privilege escalation. 
b. Horizontal privilege escalation. 
c. Diagonal privilege escalation. 
d. None of these.

Answer:- a

Q4. Which of the following can self-replicate itself?

a. Trojan 
b. Virus 
c. Ransomware 
d. All of these

Answer:- b

👇FOR NEXT WEEK: ASSIGNMENT 6 ANSWERS👇

NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022

Q5. Which of the following can be performed using the NMAP tool?

a. Identify open ports on a target system. 
b. Identify the operating system that is running on a target system. 
c. Identify the hosts available in a network. 
d. Vulnerability available on a target system.

Answer:- a,b,c,d

Q6. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?

a. nmap — script=script_name.nse 
b. nmap — script script_name.nse 
c. nmap — script script_name 
d. nmap script_name.nse

Answer:- a,b,c

Q7. Which of the following http scripts can be used to detect if a target system is running a webserver?

a. http-methos 
b. http-brute 
c. http-slowloris-check 
d. ftp-anon

Answer:- a

Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.

NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022

Q8. Which of the following approaches can be used to create a secure hacking environment?

a. Use of proxy tools/servers 
b. Using kali Linux in a live mode 
c. Use of MAC changer tool 
d. Use of firewalls 
e. None of these

Answer:- a, c

Q9. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?

a. ssh 10.0.0.1 -l user 
b. ssh 10.0.0.1 -l user -p pwd 
c. ssh 10.0.0.1 user pwd 
d. ssh [email protected]

Answer:- a, d

Q10. Which of the following approaches can be used to enumerate all user available in a target system?

a. Use of nmap script smb-enum-user 
b. Hydra tool 
c. Crunch tool 
d. Enum4linux

Answer:- a,d

Q11.Which of the following ports should be open on the target system to run a nmap script http-malware-host?

a. HTTP 
b. ssh 
c. telnet 
d. Dose not require any services to be running

Answer:- For Answer Click Here

Q12. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?

a. Client 
b. Server

Answer:- b

Q13. Which of the following protocol(s) is/are not vulnerable to sniffing?

a. HTTP 
b. Telnet 
c. POP 
d. HTTPS 
e. SMTP

Answer:- d

Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.

a. True 
b. False

Answer:- For Answer Click Here

Q15. Which of the following commands is used to see arp table in a system?

a. arp -a 
b. arp -s 
c. arp -i 
d. arp -d

Answer:- a

👇FOR NEXT WEEK: ASSIGNMENT 6 ANSWERS👇

NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022

Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:- CLICK HERE

Join Our Telegram:- CLICK HERE

NPTEL Ethical Hacking Assignment 6 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

3 thoughts on “NPTEL Ethical Hacking Assignment 5 Quiz Answers 2022”

Leave a Comment