NPTEL Ethical Hacking Week 4 Assignment Answers 2024
1. Which of the following statement(s) is/are true?
a. Hypervisor allows one host system to support multiple virtual machines by sharing the resources.
b. Hypervisor allows one host system to support multiple virtual machines; however, it does not allow resource sharing.
c. Kali-linux is a Debian-based Linux distribution that has collection of tools that are useful for penetration testing.
d. Kali-linux is a hack-proof secured operating system.
e. None of these.
Answer :- For Answers Click Here
2. Which of the following statement(s) is/are true about “Active Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Answer :- For Answers Click Here
3. Which of the following information cannot be retrieved using Whois database lookup?
a. Registration details
b. Name Servers.
c. IP Address
d. History of the website.
e. None of these.
Answer :-
4. What is the main objective of port scan?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of the operating system of the target systems.
d. None of these.
Answer :-
5. Which of the following statement(s) is/are true for host discovery using ICMP ECHO sweep?
a. For ICMP ECHO sweep; -PP option is used.
b. The attacker sends out an ICMP ECHO request packet to the target, and waits for
an ICMP ECHO reply response.
c. If the attacker does not receive an ICMP ECHO reply then the host is considered
as down.
d. If the attacker does not receive an ICMP ECHO reply then the host is considered
as live.
Answer :- For Answers Click Here
6. Which of the following options are used for host discovery using TCP and UDP sweep respectively?
a. PE, PA
b. PP, PU
c. PM, PA
d. PA, PU
Answer :-
7. Which of the following option is used for OS detection?
a. PU
b. Os
c. 0
d. sO
e. None of these.
Answer :- For Answers Click Here
8. How many ports are scanned in NMAP for a target system if we use -F option_____________?
Answer :-
9. If we want to disable host discovery in port scanning, then which of the following options can be used?
a. F
b. P
c. Pn
d. sn
e. We cannot disable host discovery.
Answer :-
10. Which of the following can be used to reconnaissance countermeasures?
a. Do not release critical info in public.
b. Encrypt password and sensitive information.
c. Restrict zone transfer.
d. Examine logs periodically.
e. Use firewalls.
Answer :- For Answers Click Here
NPTEL Ethical Hacking Week 4 Assignment Answers 2023
Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.
Answer:- c
Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Answer:- For Answer Click Here
Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra
Answer:-
Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.
Answer:- For Answer Click Here
Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these
Answer:-
Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.
Answer:- For Answer Click Here
Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these
Answer:-
Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU
Answer:- For Answer Click Here
Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:-
Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- For Answer Click Here
Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer:-
Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False
Answer:- For Answer Click Here
Q13. By default how many ports are scanned in MAP for a target system
Answer:-
Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.
Answer:- For Answer Click Here
Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these
Answer:-