NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
NPTEL Ethical Hacking Assignment Answers 2022 | Answers |
Assignment 1 | Click Here |
Assignment 2 | Click Here |
Assignment 3 | Click Here |
Assignment 4 | Click Here |
Assignment 5 | Click Here |
Assignment 6 | Click Here |
Assignment 7 | Click Here |
Assignment 8 | Click Here |
Assignment 9 | NA |
Assignment 10 | NA |
Assignment 11 | NA |
Assignment 12 | NA |
NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-
Q1. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:
H1 = HASH (M1)
H2 = HASH (M2)
When do we say there is a collision?
a. H1 = H2.
b. M1 = M2.
c. H1 = HASH (H2).
d. None of these.
Answer:- a. H1 = H2.
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Q2. What do you mean by first preimage resistance in the context of hash functions?
a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H.
b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) = HASH(M2).
c. It is difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2).
d. None of these.
Answer: a
Q3. What kind of mapping does a hash function implement?
a. One-to-one mapping.
b. Many-to-one mapping.
c. One-to-many mapping.
d. Many-to-many mapping.
Answer: b
Q4. Which of the following is/are not hash functions?
Answer: b, d
Q5. Which of the following algorithms are the slowest and the fastest?
Answer: d
Q6. What are the block size of DES algorithm and the hash digest size of MD5 algorithm?
Answer:- c
👉 If There Will be Any Changes in Answer, We will Notify On Telegram, So JOIN 👈
Q7. On which cryptographic algorithm can the birthday attack be mounted?
Answer: a
Q8. What kinds of algorithms are typically used in the computation of digital signature?
Answer: For Answer Click Here
Q9. The SSL record protocol is responsible for
Answer: d
Q10. Which of the following security protocols work above the IP layer in the TCP/IP protocol stack?
Answer: b, c, d
👇FOR NEXT WEEK ASSIGNMENT ANSWERS👇
Disclaimer:- We do not claim 100% surety of solutions, these solutions are based on our sole expertise, and by using posting these answers we are simply looking to help students as a reference, so we urge do your assignment on your own.
For More NPTEL Answers:- CLICK HERE
Join Our Telegram:- CLICK HERE
NPTEL Ethical Hacking Assignment 7 Quiz Answers 2022:-All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.
1 thought on “NPTEL Ethical Hacking Assignment 7 Answers 2022”