Ethical Hacking | Week 1
Session: JUL-DEC 2024
Course name: Ethical Hacking
Course Link: Click Here
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
Q1.In which of the following penetration testing models, no information about the network is given to the tester?
a. White box model.
b. Black box model.
c. Gray box model.
d. Red box model.
Answer: b. Black box model.
Q2.Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link may be shared by more than connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. It is more efficient for bursty traffic.
Answer: b. A communication link is dedicated to a connection and cannot be shared with other connections.
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
Q3.Which of the following statement(s) is/are false for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.
Answer: c. All the packets reach in order to the destination.
Q4.A packet of size 2000 bytes is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ______ msec. (Assume 1K = 1000)
Answer: 325
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
Q5.Which of the following OSI layers is responsible for end-to-end reliable data transfer?
a. Physical layer
b. Transport layer
C. Network layer
d. Datalink layer
Answer: b. Transport layer
Q6.Which of the following statement(s) is/are true for the IP address?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
C. It indicates how many hardware ports are there in the computer system.
d. None of these.
Answer:a. It uniquely identifies a network interface of a computer system.
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
Q7.How many bits are used for IP address (in IPv4) and port number respectively?
a. 32,8
b. 32, 16
c. 128,8
d. 128, 16
Answer: b. 32, 16
Q8.Which of the following is not a valid port numbers in TCP/IP?
a. 21
b. 80
C. 443
d. 8080
e. 80800
Answer: e. 80800
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
Q9.If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal) _____
?
Answer: 7
Q10 .The minimum size of IP header required in an IP datagram is ______ bytes.
Answer: 20
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment 1 Answers
More Weeks of Ethical Hacking: Click here
More Nptel Courses: https://progiez.com/nptel-assignment-answers