Ethical Hacking | Week 1

Session: JUL-DEC 2024

Course name: Ethical Hacking

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers


Q1.In which of the following penetration testing models, no information about the network is given to the tester?
a. White box model.
b. Black box model.
c. Gray box model.
d. Red box model.

Answer: b. Black box model.


Q2.Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link may be shared by more than connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. It is more efficient for bursty traffic.

Answer: b. A communication link is dedicated to a connection and cannot be shared with other connections.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers


Q3.Which of the following statement(s) is/are false for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.

Answer: c. All the packets reach in order to the destination.


Q4.A packet of size 2000 bytes is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ______ msec. (Assume 1K = 1000)

Answer: 325


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers


Q5.Which of the following OSI layers is responsible for end-to-end reliable data transfer?
a. Physical layer
b. Transport layer
C. Network layer
d. Datalink layer

Answer: b. Transport layer


Q6.Which of the following statement(s) is/are true for the IP address?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
C. It indicates how many hardware ports are there in the computer system.
d. None of these.

Answer:a. It uniquely identifies a network interface of a computer system.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers


Q7.How many bits are used for IP address (in IPv4) and port number respectively?
a. 32,8
b. 32, 16
c. 128,8
d. 128, 16

Answer: b. 32, 16


Q8.Which of the following is not a valid port numbers in TCP/IP?
a. 21
b. 80
C. 443
d. 8080
e. 80800

Answer: e. 80800


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers


Q9.If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal) _____
?

Answer: 7


Q10 .The minimum size of IP header required in an IP datagram is ______ bytes.

Answer: 20


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment 1 Answers

More Weeks of Ethical Hacking: Click here

More Nptel Courses: https://progiez.com/nptel-assignment-answers


Ethical Hacking Nptel Week 1 Assignment 1 Answers