NPTEL Ethical Hacking Week 5 Assignment Answers 2024
1. Which of the following NMAP options can be used to run some of the nmap scripts?
a. PE
b. PU
с. А
d. O
e. sC
Answer :- For Answers Click Here
2. Which of the following NMAP scripts is used to perform Dos attack?
a. ssh-brute
b. smb-os-discovery
c. smb-brute
d. http-dos-attack
e. None of these
Answer :- For Answers Click Here
3. Which of the following tools/software can be used for scanning vulnerabilities?
a. Nessus
b. Hydra
c. crunch
d. hascat
e. NMAP
Answer :-
4. Which of the following tools can be used to create a dictionary for dictionary-based password attack?
a. Hydra
b. Crunch
c. SQLMAP
d. None of these.
Answer :-
5. Consider the following statements:
(i) User enumeration refers to collecting details of users and their privileges.
(ii) Hydra and Crunch tool can be used for user enumeration.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer :-
6. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the
username and password are “user” and “pwd” respectively. Which of the following commands
can be used to create a ssh connection?
a. ssh 10.0.0.1 – user -p pwd
b. ssh 10.0.0.1 -I user
c. ssh 10.0.0.1@user
d. None of these
Answer :- For Answers Click Here
7. How many words will be generate by crunch tool if we use the crunch command as “crunch 12
0123456789″?
Answer :-
8. Which of the following can be used for gaining same level privilege as the existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. Triangular privilege escalation.
e. None of these.
Answer :-
9. Which of the following tools can be used for user enumeration?
a. Hydra
b. Crunch
c. Enum4linux
d. None of these.
Answer :-
10. To download any file from the target system that is connected through FTP connection, which
of the following commands can be used?
a. put
b. get
c. upload
d. download
Answer :- For Answers Click Here
11. Which of the following statements) is/are false?
a. Malware are malicious software that damages or disables computer systems and gives limited or full control to the malware creator for the purpose of theft or fraud.
b. Malware can get inside systems through file sharing or fake programs.
c. Malwares can alter, corrupt, modify or delete some data/files.
d. None of these.
Answer :-
12. Which of the following commands is used to delete an ARP entry?
a. arp-l
b. arp-s
с. arp-i
d. arp -e
e. None of these
Answer :- For Answers Click Here