Ethical Hacking Nptel Week 9 Assignment Answers
Are you looking for Ethical Hacking Nptel Week 9 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 9 assignment in the Ethical Hacking course.
Course Link: Click Here
Table of Contents
Ethical Hacking Nptel Week 9 Assignment Answers (July-Dec 2024)
Q1 .Which of the following protocols is/are vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. HTTPS
d. SSL
e. None of these.
Answer: a. HTTP
b. Telnet
‘Q2.In Wireshark, which filter will show only packets for the IP address of 192.168.1.100
a. ip==192.168.1.100
b. ip.addr==192.168.1.100
c. ip.address = 192.168.1.100
d. src==192.168.1.100.
e. None of these.
Answer: b. ip.addr==192.168.1.100
For answers or latest updates join our telegram channel: Click here to join
Q3.Consider the following statements.
(i) Burp suite can be used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer: b. Only (ii) is true.
Q4.What is the purpose of repeater module available in burp suite?
a. It is used to mount password attack.
b. It is used for manipulating and reissuing packets and to analyze their response.
c. It is used for creating dictionary.
d. It is used for auto crawling web applications.
e. None of these.
Answer: b. It is used for manipulating and reissuing packets and to analyze their response.
For answers or latest updates join our telegram channel: Click here to join
Q5.In Burp suite which of the following modules is used for auto crawling of webpages.
a. Spider
b. Scanner
c. Intruder
d. Proxy
e. None of these.
Answer: a. Spider
d. Proxy
Q6.Which of the following approach(es) can protect against sniffing?
a. Permanently add the MAC address of gateway to ARP cache.
b. Use unencrypted session such as telnet, ftp.
c. Restrict physical access to the network media.
d. Use static IP addresses and static ARP tables.
e. None of these.
Answer: a. Permanently add the MAC address of gateway to ARP cache.
c. Restrict physical access to the network media.
d. Use static IP addresses and static ARP tables.
For answers or latest updates join our telegram channel: Click here to join
Q7.Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof
Answer: d. SEToolkit
Q8.Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Chain letters
e. Phishing
f. Pop-up Windows
Answer: a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Chain letters
For answers or latest updates join our telegram channel: Click here to join
Q9.How does Slowloris attack work?
a. It sends a single large ping packet to victim system.
b. It sends large number ARP packet to the victim system.
c. Itsends large number of ICMP packets.
d. None of these.
Answer: d. None of these.
Q10.For mounting DoS attack using hping3 tool how many packets will be send per second if we use faster option?
a. 10
b. 100
c. 1000
d. 10000
Answer: b. 100
For answers or latest updates join our telegram channel: Click here to join
More Weeks of Ethical Hacking: Click here
For answers to additional Nptel courses, please refer to this link: NPTEL Assignment
Ethical Hacking Nptel Week 9 Assignment Answers (July-Dec 2023)
Course Link: Click Here
These are NPTEL Ethical Hacking Assignment 9 Answers
Q1. Which of the following statement(s) is/are true for sniffing?
a. Itis a process of analyzing network activity by capturing network traffic.
b. Itis a process of finding the vulnerability in a network.
c. Itis a process used for user enumeration.
d. None of these.
Answer: a. Itis a process of analyzing network activity by capturing network traffic.
Q2. Consider the following statements.
(i) Burp suite is a popular tool used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer: c. Both (i) and (ii) are true.
These are NPTEL Ethical Hacking Assignment 9 Answers
Q3. What is the purpose of repeater module available in burp suite?
a. Itis used to mount password attack.
b. Itis used for manipulating and reissuing packets and to analyze their response.
c. Itis used for creating dictionary.
d. None of these.
Answer: b. Itis used for manipulating and reissuing packets and to analyze their response.
Q4. Which of the following approach(es) cannot protect against sniffing?
a. Restrict physical access to the network media.
b. Permanently add the MAC address of gateway to ARP cache.
c. Use encryption to protect confidential information.
d. Use dynamic IP address and ARP entries.
e. None of these.
Answer: d. Use dynamic IP address and ARP entries.
These are NPTEL Ethical Hacking Assignment 9 Answers
See also Ethical Hacking Nptel Week 5 Assignment Answers
Q5. Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Pop-up windows
e. Chain letters
f. phishing
Answer: a, b, c
Q6. Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof
Answer: d. SEToolkit
These are NPTEL Ethical Hacking Assignment 9 Answers
Q7. Which of the following protocols is/are not vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. SSH
d. SSL
Answer: c, d
Q8. Which of the following can be used as a countermeasure for DoS/DDoS attack?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
e. None of this.
Answer: a, b, c, d
These are NPTEL Ethical Hacking Assignment 9 Answers
Q9. Which of the following tool/approach cannot be used to perform DoS attack?
a. Hping3 tool
b. “http-slowloris” nmap script
c. LOIC tool
d. Hydra and Crunch.
Answer: d. Hydra and Crunch.
Q10. For mounting DoS attack using hping3 tool how many packets will be send per second if we use –faster option?
a. 10
b. 100
c. 1000
d. 10000
Answer: b. 100
These are NPTEL Ethical Hacking Assignment 9 Answers