Ethical Hacking Nptel Week 1 Assignment Answers

Are you looking for Ethical Hacking Nptel Week 1 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 1 assignment in the Ethical Hacking course.

Ethical Hacking Nptel Week 1 Assignment Answers (July-Dec 2025)


Que.1 What is the main objective of ethical hacking?
A) Deletes files from a system.
B) Inserts malwares in a system.
C) Legally Identify system vulnerabilities.
D) Steal sensitive information.

View Answer


Que.2 Which of the following are types of penetration testing methodologies?
A) White Box
B) Black Box
C) Red Box
D) Trojan Horse

View Answer


Que.3 Which of the following switching techniques is more efficient for bursty data traffic?
A) Circuit Switching
B) Message Switching
C) Packet Switching
D) None of these

View Answer


Que.4 Which protocol in TCP/IP is connectionless and does not provide reliability?
A) TCP
B) UDP
C) FTP
D) TELNET

View Answer


Que.5 Which IP header field prevents infinite looping of packets?
A) Header Checksum
B) Time to Live
C) Fragment offset
D) HLEN

View Answer


Que.6 What are the responsibilities of the IP layer?
A) Framing
B) Route packets
C) Provide reliable transmission
D) None of these

View Answer


Que.7 Which of the following is/are not a valid field of IP header?
A) TTL
B) Port Number
C) Protocols
D) MAC address

View Answer


Que.8 Which of the following statements is/are true about datagram packet switching?
A) Requires prior route establishment.
B) Faster for fewer packets.
C) Uses dynamic routing.
D) All packets follow the same path.

See also  Programming in Modern C++ Week 1 Assignment Answers

View Answer


Que.9 The max value (in decimal) for HLEN field (header length) is:
Fill in the blank

View Answer


Que.10 The header checksum field in the IP header is ___ bits wide.
Fill in the blank

View Answer


Ethical Hacking Nptel Week 1 Assignment Answers (July-Dec 2024)

Course name: Ethical Hacking

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers


Q1.In which of the following penetration testing models, no information about the network is given to the tester?
a. White box model.
b. Black box model.
c. Gray box model.
d. Red box model.

Answer: b. Black box model.


Q2.Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link may be shared by more than connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. It is more efficient for bursty traffic.

Answer: b. A communication link is dedicated to a connection and cannot be shared with other connections.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers


Q3.Which of the following statement(s) is/are false for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.

See also  Introduction To Machine Learning IIT-KGP Week 1 Answers

Answer: c. All the packets reach in order to the destination.


Q4.A packet of size 2000 bytes is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ______ msec. (Assume 1K = 1000)

Answer: 325


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers


Q5.Which of the following OSI layers is responsible for end-to-end reliable data transfer?
a. Physical layer
b. Transport layer
C. Network layer
d. Datalink layer

Answer: b. Transport layer


Q6.Which of the following statement(s) is/are true for the IP address?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
C. It indicates how many hardware ports are there in the computer system.
d. None of these.

Answer:a. It uniquely identifies a network interface of a computer system.


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers


Q7.How many bits are used for IP address (in IPv4) and port number respectively?
a. 32,8
b. 32, 16
c. 128,8
d. 128, 16

Answer: b. 32, 16


Q8.Which of the following is not a valid port numbers in TCP/IP?
a. 21
b. 80
C. 443
d. 8080
e. 80800

Answer: e. 80800


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers


Q9.If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal) _____
?

See also  Ethical Hacking | Week 12

Answer: 7


Q10 .The minimum size of IP header required in an IP datagram is ______ bytes.

Answer: 20


For answers or latest updates join our telegram channel: Click here to join

These are Ethical Hacking Nptel Week 1 Assignment Answers

More Weeks of Ethical Hacking: Click here

More Nptel Courses: https://progiez.com/nptel-assignment-answers


Ethical Hacking Nptel Week 1 Assignment 1 Answers