Ethical Hacking Nptel Week 9 Assignment Answers

Are you looking for Ethical Hacking Nptel Week 9 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 9 assignment in the Ethical Hacking course.

Course Link: Click Here


NPTEL Ethical Hacking Assignment 9 Answers
NPTEL Ethical Hacking Assignment 9 Answers

Ethical Hacking Nptel Week 9 Assignment Answers (July-Dec 2024)


Q1 .Which of the following protocols is/are vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. HTTPS
d. SSL
e. None of these.

Answer: a. HTTP
b. Telnet


Q2.In Wireshark, which filter will show only packets for the IP address of 192.168.1.100
a. ip==192.168.1.100
b. ip.addr==192.168.1.100
c. ip.address = 192.168.1.100
d. src==192.168.1.100.
e. None of these.

Answer: b. ip.addr==192.168.1.100


For answers or latest updates join our telegram channel: Click here to join


Q3.Consider the following statements.
(i) Burp suite can be used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer: b. Only (ii) is true.


Q4.What is the purpose of repeater module available in burp suite?
a. It is used to mount password attack.
b. It is used for manipulating and reissuing packets and to analyze their response.
c. It is used for creating dictionary.
d. It is used for auto crawling web applications.
e. None of these.

Answer: b. It is used for manipulating and reissuing packets and to analyze their response.


For answers or latest updates join our telegram channel: Click here to join


Q5.In Burp suite which of the following modules is used for auto crawling of webpages.
a. Spider
b. Scanner
c. Intruder
d. Proxy
e. None of these.

See also  Ethical Hacking | Week 10

Answer: a. Spider
d. Proxy


Q6.Which of the following approach(es) can protect against sniffing?
a. Permanently add the MAC address of gateway to ARP cache.
b. Use unencrypted session such as telnet, ftp.
c. Restrict physical access to the network media.
d. Use static IP addresses and static ARP tables.
e. None of these.

Answer: a. Permanently add the MAC address of gateway to ARP cache.
c. Restrict physical access to the network media.
d. Use static IP addresses and static ARP tables.


For answers or latest updates join our telegram channel: Click here to join


Q7.Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof

Answer: d. SEToolkit


Q8.Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Chain letters
e. Phishing
f. Pop-up Windows

Answer: a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Chain letters


For answers or latest updates join our telegram channel: Click here to join


Q9.How does Slowloris attack work?
a. It sends a single large ping packet to victim system.
b. It sends large number ARP packet to the victim system.
c. Itsends large number of ICMP packets.
d. None of these.

Answer: d. None of these.


Q10.For mounting DoS attack using hping3 tool how many packets will be send per second if we use faster option?

a. 10

b. 100

c. 1000

d. 10000

Answer: b. 100


For answers or latest updates join our telegram channel: Click here to join

See also  Ethical Hacking | Week 3

More Weeks of Ethical Hacking: Click here

For answers to additional Nptel courses, please refer to this link: NPTEL Assignment


Ethical Hacking Nptel Week 9 Assignment Answers (July-Dec 2023)

Course Link: Click Here

These are NPTEL Ethical Hacking Assignment 9 Answers


Q1. Which of the following statement(s) is/are true for sniffing?
a. Itis a process of analyzing network activity by capturing network traffic.
b. Itis a process of finding the vulnerability in a network.
c. Itis a process used for user enumeration.
d. None of these.

Answer: a. Itis a process of analyzing network activity by capturing network traffic.


Q2. Consider the following statements.
(i) Burp suite is a popular tool used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.

a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer: c. Both (i) and (ii) are true.


These are NPTEL Ethical Hacking Assignment 9 Answers


Q3. What is the purpose of repeater module available in burp suite?
a. Itis used to mount password attack.
b. Itis used for manipulating and reissuing packets and to analyze their response.
c. Itis used for creating dictionary.
d. None of these.

Answer: b. Itis used for manipulating and reissuing packets and to analyze their response.


Q4. Which of the following approach(es) cannot protect against sniffing?
a. Restrict physical access to the network media.
b. Permanently add the MAC address of gateway to ARP cache.
c. Use encryption to protect confidential information.
d. Use dynamic IP address and ARP entries.
e. None of these.

Answer: d. Use dynamic IP address and ARP entries.


These are NPTEL Ethical Hacking Assignment 9 Answers

See also Ethical Hacking Nptel Week 5 Assignment Answers

See also  Ethical Hacking | Week 8

Q5. Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Pop-up windows
e. Chain letters
f. phishing

Answer: a, b, c


Q6. Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof

Answer: d. SEToolkit


These are NPTEL Ethical Hacking Assignment 9 Answers


Q7. Which of the following protocols is/are not vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. SSH
d. SSL

Answer: c, d


Q8. Which of the following can be used as a countermeasure for DoS/DDoS attack?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
e. None of this.

Answer: a, b, c, d


These are NPTEL Ethical Hacking Assignment 9 Answers


Q9. Which of the following tool/approach cannot be used to perform DoS attack?
a. Hping3 tool
b. “http-slowloris” nmap script
c. LOIC tool
d. Hydra and Crunch.

Answer: d. Hydra and Crunch.


Q10. For mounting DoS attack using hping3 tool how many packets will be send per second if we use –faster option?
a. 10
b. 100
c. 1000
d. 10000

Answer: b. 100


These are NPTEL Ethical Hacking Assignment 9 Answers