Ethical Hacking | Week 1

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers


Q1) In which of the following penetration testing models, no information about the network is given to tester?
a. White box model.
b. Black box model.
c. Red box Model.
d. Gray box model.
e. None of these.

Answer: b. Black box model.


Q2) Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
e. It is efficient for bursty traffic.

Answer: b, d


Q3) A 1000 byte packet is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 10 msec. The packet will reach the destination after ________ msec. (Assume 1K = 1000)

Answer: 170


These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers


Q4) Which of the following statement(s) is/are true for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. In this approach, each packets follows distinct path.
c. The intermediate node can perform dynamic routing.
d. All the packets reach in order to the destination.
e. It is a true packet switched network.

Answer: a, d


Q5) Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?
a. Session layer
b. Transport layer
c. Network layer
d. Datalink layer
e. Physical layer

Answer: b. Transport layer


These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers


Q6) Which of the following is/are false for TCP/IP model?
a. It allows cross-platform communications among heterogeneous networks.
b. It is a scalable client-server architecture which allows network modification without disrupting the current services.
c. It can also represent any other protocol stack other than the TCP/IP suite such as Bluetooth connection.
d. None of these.

Answer: c. It can also represent any other protocol stack other than the TCP/IP suite such as Bluetooth connection.


These are Ethical Hacking Week 1 Assignment Answers


Q7) Which of the following is true for the IP?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
c. It indicates how many hardware ports are there in the computer system.
d. None of these.

Answer: b. It uniquely identifies a host in the network.


Q8) How many bits are used for IP address (in IP version 4) and port number respectively
a. 32,8
b. 32, 16
c. 48, 8
d. 48, 16

Answer: a. 32,8


Q9) If a 2000 byte data message is sent using a TFTP, the corresponding Ethernet packet will be of size ________ bytes.

Answer: 2050


These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers


Q10) If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field ______?

Answer: 6



These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers
These are NPTEL Ethical Hacking Week 1 Assignment 1 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.