Ethical Hacking Nptel Week 2 Assignment Answers

Are you looking for Ethical Hacking Nptel Week 2 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 2 assignment in the Ethical Hacking course.

Course Link: Click Here

Ethical Hacking Nptel Week 2 Assignment Answers 2024
Ethical Hacking Nptel Week 2 Assignment Answers 2024

Ethical Hacking Nptel Week 2 Assignment Answers 2024

Session: JUL-DEC 2024


Q1. Which of the following statement(s) is/are true for transparent fragmentation?
a. The subsequent networks are aware that the fragmentation has occurred.
b. It is required to route all packet to the same exit router in a network.
C. Each fragment is treated as an independent packet.
d. All fragmented packets are reassembled by host system.
e. All fragmented packets are reassembled by the exit router.

Answer: c),d)


Q2.For reassembling the fragmented packets at the final destination, which of the following header field(s) is (are) used by IP?
a. Fragment offset.
b. Flags.
C. Header checksum.
d. HLEN.
e. Identification.

Answer:a),b),e)


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 2 Assignment Answers 2024


Q3.An IP packet arrives at the final destination with the D flag set as 1. Which of the following statement is true about the packet?
a. The packet has not been fragmented.
b. The packet has been fragmented and it is the first fragment.
c. The packet has been fragmented and it is the last fragment.
d. None of these.

Answer: a. The packet has not been fragmented.


Q4.In an IP packet, the value of HLEN is 8, and the total size of IP packet is 1500 bytes. The number of data bytes in the packet will be

Answer: 1468


For answers or latest updates join our telegram channel: Click here to join

See also  Ethical Hacking | Week 1

These are Ethical Hacking Nptel Week 2 Assignment Answers 2024


Q5.Which of the following statement(s) is/are false for IP addressing?
a. Each host connected to the Internet is defined by an IP address.
b. IP address consist of two parts: network number and host number.
c. When a packet is routed to the destination network, only the network number is used.
d. None of these.

Answer: c. When a packet is routed to the destination network, only the network number is used.


Q6.Which address classes do the IP addresses 10.16.75.12 and 192.10.85.120 belong to?
a. Class A and Class B
b. Class B and Class C
c. Class C and Class D
d. Class A and Class C

Answer: d. Class A and Class C


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 2 Assignment Answers 2024


Q7.Which of the following IP addresses does not represent broadcast address?
a. 10.0.0.255
b. 10.255.255.255
C. 144.16.255.255
d. 173.16.0.255
e. 192.168.5.255
f. 192.168.255.0

Answer: f. 192.168.255.0


Q8.Which of the following statement(s) is/are false for flag bits in TCP header?
a. SYN=1 and ACK=0 represents a connection request message.
b. SYN=1 and ACK=1 represents a connection confirmation message.
c. RST bit is used to reset/reject connection request.
d. None of these.

Answer: d. None of these.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 2 Assignment Answers 2024


Q9.What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.242.0?
a. 144.16.32.0
b. 144.16.34.0
c. 144.16.34.255
d. 144.16.242.255

Answer: b. 144.16.34.0


Q10 .An organization is allotted an address block with beginning address as: 144.16.192.24/29 in CIDR notation. What will be the address range for that block?
a. 144.16.192.0 to 144.16.192.8
b. 144.16.192.8 to 144.16.192.16
c. 144.16.192.16 to 144.16.192.24
d. 144.16.192.24 to 144.16.192.31

Answer: d. 144.16.192.24 to 144.16.192.31

See also  Ethical Hacking | Week 8

For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 2 Assignment Answers 2024

More Weeks of Ethical Hacking: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answers


Ethical Hacking Nptel Week 2 Assignment Answers (Jan-Apr 2024)

Course Link: Click Here

These are NPTEL Ethical Hacking Week 2 Assignment Answers


Q1. Which of the following is/are false for IP fragmentation?
a. It is a process that divides packets into smaller fragments.
b. Fragmentation is required due to intermediate networks with smaller maximum transmission unit (MTU).
c. Each fragmented packet is considered as separate IP packet.
d. IP fragmentation is typically done by layer-2 switches.
e. None of these.

Answer: d. IP fragmentation is typically done by layer-2 switches.


Q2. Consider the following statements:
(i) In transparent fragmentation, all fragmented packets are reassembled by an exit router.
(ii) In non-transparent fragmentation, all fragmented packets reassembled by host.

a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer: c. Both (i) and (ii) are true.


These are NPTEL Ethical Hacking Week 2 Assignment Answers


Q3. For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used by IP?
a. Fragment offset.
b. Flags.
c. Header checksum.
d. HLEN.
e. Identification.

Answer: a, b, e


Q4. An IP packet arrives at a router with the first eight bits as 01001100. How many bytes are there in the OPTIONS field

Answer: 28


These are NPTEL Ethical Hacking Week 2 Assignment Answers


Q5. In an IP packet, the value of HLEN is 6, and the value of the TOTAL LENGTH field is 1000 (one thousand). The number of data bytes in the packet will be _______.

Answer: 976

See also  Ethical Hacking Nptel Week 9 Assignment Answers

Q6. Which of the following is/are true for IP addressing?
a. Each host connected to the Internet is defined by an IP address.
b. IP address consist of two parts : network number and host number.
c. When a packet is routed to the destination network, only the host number is used.
d. Class A address can have a maximum of 16,777,214 networks.
e. None of these.

Answer: a, b


These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers


Q7. Which of the following is/are not a feature of TCP?
a. Process to process communication.
b. Stream delivery service.
c. Connection-oriented service.
d. Unreliable service.
e. Full duplex communication.
f. None of these.

Answer: d


Q8. Which of the following statement(s) is/are false for flag bits in TCP header?
a. SYN=1 and ACK=1 represents a connection request message.
b. SYN=1 and ACK=0 represents a connection confirmation message.
c. RST bit is used to reject connection request.
d. PUSH bit is used to indicate end of a message
e. None of these.

Answer: a, b


These are NPTEL Ethical Hacking Week 2 Assignment Answers


Q9. What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.242.0?
a. 144.16.32.0
b. 144.16.34.0
c. 144.16.34.255
d. 144.16.242.0
e. 144.16.242.255

Answer: b. 144.16.34.0


Q10. An organization is allotted a block with beginning address as: 144.16.192.16/28 in CIDR notation. What will be the address range for that block?
a. 144.16.192.0 to 144.16.192.16
b. 144.16.192.0 to 144.16.192.255
c. 144.16.192.16 to 144.16.192.31
d. 144.16.192.16 to 144.16.192.32

Answer: c



These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/