Ethical Hacking Nptel Week 4 Assignment Answers

Are you looking for Ethical Hacking Nptel Week 4 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 4 assignment in the Ethical Hacking course.

Course Link: Click Here


Ethical Hacking Nptel Week 4 Assignment Answers
Ethical Hacking Nptel Week 4 Assignment Answers

Ethical Hacking Nptel Week 4 Assignment Answers (July-Dec 2024)

Session: JUL-DEC 2024


Q1 Which of the following statement(s) is/are true?
a. Hypervisor allows one host system to support multiple virtual machines by sharing the resources.
b. Hypervisor allows one host system to support multiple virtual machines; however, it does not allow resource sharing.
C. Kali-linux is a Debian-based Linux distribution that has collection of tools that are useful for penetration testing.
d. Kali-linux is a hack-proof secured operating system.
e. None of these.

Answer: a. Hypervisor allows one host system to support multiple virtual machines by sharing the resources. ,C. Kali-linux is a Debian-based Linux distribution that has collection of tools that are useful for penetration testing.


Q2.Which of the following statement(s) is/are true about “Active Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.

Answer: b. Information about the target is collected directly.
c. There is a chance of detection.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q3.Which of the following information cannot be retrieved using Whois database lookup?
a. Registration details
b. Name Servers.
C. IP Address
d. History of the website.
e. None of these.

Answer: d. History of the website.


Q4.What is the main objective of port scan?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of the operating system of the target systems.
d. None of these.

Answer: b. Identification of services running in the target system.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q5.Which of the following statement(s) is/are true for host discovery using ICMP ECHO sweep?
a. For ICMP ECHO sweep; -PP option is used.
b. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
C. If the attacker does not receive an ICMP ECHO reply then the host is considered as down.
d. If the attacker does not receive an ICMP ECHO reply then the host is considered as live.

Answer:b. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
C. If the attacker does not receive an ICMP ECHO reply then the host is considered as down.


Q6.Which of the following options are used for host discovery using TCP and UDP sweep respectively?
a. PE, PA
b. PP, PU
c. PM, PA
d. PA, PU

Answer: d. PA, PU


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q7.IWhich of the following option is used for OS detection?
a. PU
b. Os
C.O
d. so
e. None of these.

Answer: C.O


Q8.How many ports are scanned in NMAP for a target system if we use -F option?

Answer:100


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q9.If we want to disable host discovery in port scanning, then which of the following options can be used?
a. F
b. p
c. Pn
d. sn
e. We cannot disable host discovery.

Answer:c. Pn


Q10 Which of the following can be used to reconnaissance countermeasures?
a. Do not release critical info in public.
b. Encrypt password and sensitive information.
C. Restrict zone transfer.
d. Examine logs periodically.
e. Use firewalls.

Answer: a. Do not release critical info in public.
C. Restrict zone transfer.
d. Examine logs periodically.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 4 Assignment Answers 2024

More Weeks of Ethical Hacking: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment Answe


Ethical Hacking Nptel Week 4 Assignment Answers (Jan-Apr 2024)


Q1. Which of the following statement(s) is/are false?
a. Hypervisor allows one host system to support multiple virtual machines by sharing the resources.
b. Hypervisor allows one host system to support multiple virtual machines; however, it does not allow resource sharing.
c. Kali-linux is a Debian-based Linux distribution that has collection of tools that are useful for penetration testing.
d. Kali-linux is a hack-proof secured operating system.
e. None of these.

Answer: b, d


Q2. Which of the following statement(s) is/are true about “Active Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection in active reconnaissance.
d. There is no chance of detection in active reconnaissance.

Answer: b, c


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q3. Which of the following is not an information source over the internet for an attackers?
a. Whois
b. YouTube
c. Archive.org
d. Netcraft
e. Hydra

Answer: b, e


Q4. Which of the following data cannot be retrieved about the target system/website using Whois database lookup?
a. Registration details.
b. Name servers.
c. IP address.
d. History of the website.
e. None of these.

Answer: d. History of the website.


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q5. Which of the following search operators can narrow down the search results to a site that has the targeted search term in the URL?
a. inurl
b. intitle
c. site
d. exclude
e. double quote (*)
f. filetype

Answer: a. inurl


Q6. Which of the following information can be retrieved using DNS/Mail server enumeration?
a. Usernames
b. Computer names
c. Operating system
d. Open ports
e. IP address of system
f. Size of the network

Answer: a, b, e, f


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q7. Which of the following statement(s) is/are true for host discovery using ICMP ECHO and ICMP non-ECHO sweep?

a. InICMP sweep, the attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
b. In Non-Echo ICMP sweep, the attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
c. InICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is considered as down.
d. InICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is considered as live.
e. In Non-Echo ICMP sweep, if the attacker dose not receive an ICMP ECHO reply then the host is considered as down.

Answer: a, c


Q8. Which of the following option(s) is/are used for host discovery using TCP and UDP sweep respectively?
a. PE PP
b. PE,PM
c. PS,PA
d. PS,PU
e. PA PU

Answer: d, e


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q9. Which of the following information is retrieved by port scanning?
a. Information about the operating system running on the target system.
b. The services running on the target system.
c. The IP address of the target system.
d. None of these.

Answer: b. The services running on the target system.


Q10. What kind of packet is received if the target port is closed/filtered in TCP connect/SYN scan?
a. RST
b. ACK
c. SYN-ACK
d. SYN
e. RST/ACK

Answer: e. RST/ACK


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q11. Which of the following option(s) is/are used for OS and Version detection respectively?
a. sn,PE
b. Pn,sP
c. 0,-sV
d. sT,PP
e. None of these.

Answer: c. 0,-sV


Q12. How many ports are scanned in NMAP for a target system if we use -F option ________ ?

Answer: 100


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q13. Which of the following NMAP scanning option(s) is/are correct with respect to port scanning?
a. —F
b. -p20
c. -p20-100
d. -p20:100
e. -p20, 22,28, 80
f. All of these.

Answer: a, b, c, e


Q14. If we want to disable host discovery in port scanning, then which of the following options can be used?
a. -F
b. -p-
c. -Pn
d. -sn
e. We cannot disable host discovery.

Answer: c. -Pn


These are Ethical Hacking Nptel Week 4 Assignment Answers 2024


Q15. Which of the following can be used to reconnaissance countermeasures?
a. Do not release critical info in public.
b. Encrypt password and sensitive information.
c. Restrict zone transfer.
d. Examine logs periodically.
e. Use firewalls.
f. All of these.

Answer: f. All of these.



These are Ethical Hacking Nptel Week 4 Assignment Answers 2024

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/