NPTEL Ethical Hacking Week 4 Assignment Answers 2023

admin
By admin

NPTEL Ethical Hacking Week 4 Assignment Answers 2023

NPTEL Ethical Hacking Assignment Answers 2023

NPTEL Ethical Hacking Week 4 Assignment Answers 2023

Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.

Answer:- c

Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.

Answer:- For Answer Click Here

Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra

Answer:- 

Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.

Answer:- For Answer Click Here

Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these

Answer:- 

Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.

Answer:- For Answer Click Here

Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these

Answer:- 

Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU

Answer:- For Answer Click Here

Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN

Answer:- 

Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN

Answer:- For Answer Click Here

Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.

Answer:- 

Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False

Answer:- For Answer Click Here

Q13. By default how many ports are scanned in MAP for a target system

Answer:- 

Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.

Answer:- For Answer Click Here

Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these

Answer:- 
Share This Article
Leave a comment