NPTEL Ethical Hacking Assignment 7 Answers 2022

NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

NPTEL Ethical Hacking Assignment Answers 2022Answers
Assignment 1Click Here
Assignment 2Click Here
Assignment 3Click Here
Assignment 4Click Here
Assignment 5Click Here
Assignment 6Click Here
Assignment 7Click Here
Assignment 8Click Here
Assignment 9NA
Assignment 10NA
Assignment 11NA
Assignment 12NA

NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-

Q1. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:
H1 = HASH (M1)
H2 = HASH (M2)
When do we say there is a collision?

a. H1 = H2. 
b. M1 = M2. 
c. H1 = HASH (H2). 
d. None of these.

Answer:- a. H1 = H2. 

πŸ‘‡FOR NEXT WEEK ASSIGNMENT ANSWERSπŸ‘‡

NPTEL Ethical Hacking Assignment 7 Answers 2022

Q2. What do you mean by first preimage resistance in the context of hash functions?

a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H. 
b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) = HASH(M2). 
c. It is difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2). 
d. None of these.

Answer: a

Q3. What kind of mapping does a hash function implement?

a. One-to-one mapping. 
b. Many-to-one mapping. 
c. One-to-many mapping. 
d. Many-to-many mapping.

Answer: b

Q4. Which of the following is/are not hash functions?

Answer: b, d

Q5. Which of the following algorithms are the slowest and the fastest?

Answer: d

Q6. What are the block size of DES algorithm and the hash digest size of MD5 algorithm?

Answer:- c

πŸ‘‰ If There Will be Any Changes in Answer, We will Notify On Telegram,Β So JOINΒ πŸ‘ˆ

NPTEL Ethical Hacking Assignment 7 Answers 2022

Q7. On which cryptographic algorithm can the birthday attack be mounted?

Answer: a

Q8. What kinds of algorithms are typically used in the computation of digital signature?

Answer: For Answer Click Here

Q9. The SSL record protocol is responsible for

Answer: d

Q10. Which of the following security protocols work above the IP layer in the TCP/IP protocol stack?

Answer: b, c, d

πŸ‘‡FOR NEXT WEEK ASSIGNMENT ANSWERSπŸ‘‡

NPTEL Ethical Hacking Assignment 7 Answers 2022

Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.

For More NPTEL Answers:- CLICK HERE

Join Our Telegram:- CLICK HERE

NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.

1 thought on “NPTEL Ethical Hacking Assignment 7 Answers 2022”

Leave a Comment