NPTEL Ethical Hacking Week 8 Assignment Answers 2024
1. Which of the following is/are examples of steganography?
a. Hiding some text information within an image file.
b. Hiding some text information within an audio clip.
c. Hiding some secret information within an executable file.
d. Encrypting an image file so that only the intended recipient can view it.
Answer :- For Answers Click Here
2. Consider a gray-level image of size 100 x 100, where each pixel is stored in 8-bits (representing
a gray scale). The number of bytes of information can be hidden in the image by using LSB
steganography technique is_______________.
Answer :- For Answers Click Here
3. Which of the following correspond to behavioral biometrics?
a. Biometrics that relate to human behavior.
b. Biometrics that relate to human body.
c. Biometrics that rely on the use of a powerful computer system.
d. None of these
Answer :-
4. Which of the following is/ are examples) of physiological feature?
a. Retina
b. Fingerprint
c. Signature
d. Typing speed
e. None of these
Answer :- For Answers Click Here
5. Which of the following attacks refer to the situation where an attacker gains entry into the victim machine (or spoofs the IP address) and then sends a ping request to a broadcast address?
a. SYN flooding attack.
b. Smurf denial-of-service attack.
c. DNS spoofing attack.
d. None of these.
Answer :-
6. Which of the following is not an example of denial-of-service attacks?
a. SYN flooding attack.
b. Smurf attack.
c. Ping-of-death.
d. None of these.
Answer :-
7. Which of the following is true for iterative name resolution?
a. A host may have to send multiple DNS requests to several DNS servers.
b. A host sends a single DNS request to its next higher-level DNS server.
c. Name resolution happens recursively within the host itself.
d. None of these.
Answer :- For Answers Click Here
8. Which of the following statement(s) is/are false for HTTP Flood attack?
a. It is exclusively a type of Distributed-Denial-of-Service (DDoS) attack.
b. It overwhelms a target server using oversized ping packets.
c. It overwhelms a target server with HTTP request.
d. None of these.
Answer :-
9. What is the full form of PGP?
a. Packet Group Protocol
b. Port Group Protocol
c. Pretty Good Privacy
d. None of these.
Answer :-
10. Which of the following services are provided by PGP?
a. It provides authentication.
b. It provides confidentiality.
c. It ensures availability.
d. None of these.
Answer :- For Answers Click Here