Ethical Hacking Nptel Week 1 Assignment Answers
Are you looking for Ethical Hacking Nptel Week 1 Assignment Answers? You’ve come to the right place! Access the latest and most accurate solutions for your Week 1 assignment in the Ethical Hacking course.
Table of Contents
Ethical Hacking Nptel Week 1 Assignment Answers (July-Dec 2025)
Que.1 What is the main objective of ethical hacking?
A) Deletes files from a system.
B) Inserts malwares in a system.
C) Legally Identify system vulnerabilities.
D) Steal sensitive information.
Que.2 Which of the following are types of penetration testing methodologies?
A) White Box
B) Black Box
C) Red Box
D) Trojan Horse
Que.3 Which of the following switching techniques is more efficient for bursty data traffic?
A) Circuit Switching
B) Message Switching
C) Packet Switching
D) None of these
Que.4 Which protocol in TCP/IP is connectionless and does not provide reliability?
A) TCP
B) UDP
C) FTP
D) TELNET
Que.5 Which IP header field prevents infinite looping of packets?
A) Header Checksum
B) Time to Live
C) Fragment offset
D) HLEN
Que.6 What are the responsibilities of the IP layer?
A) Framing
B) Route packets
C) Provide reliable transmission
D) None of these
Que.7 Which of the following is/are not a valid field of IP header?
A) TTL
B) Port Number
C) Protocols
D) MAC address
Que.8 Which of the following statements is/are true about datagram packet switching?
A) Requires prior route establishment.
B) Faster for fewer packets.
C) Uses dynamic routing.
D) All packets follow the same path.
Que.9 The max value (in decimal) for HLEN field (header length) is:
Fill in the blank
Que.10 The header checksum field in the IP header is ___ bits wide.
Fill in the blank
Ethical Hacking Nptel Week 1 Assignment Answers (July-Dec 2024)
Course name: Ethical Hacking
Course Link: Click Here
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
Q1.In which of the following penetration testing models, no information about the network is given to the tester?
a. White box model.
b. Black box model.
c. Gray box model.
d. Red box model.
Answer: b. Black box model.
Q2.Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link may be shared by more than connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. It is more efficient for bursty traffic.
Answer: b. A communication link is dedicated to a connection and cannot be shared with other connections.
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
Q3.Which of the following statement(s) is/are false for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.
Answer: c. All the packets reach in order to the destination.
Q4.A packet of size 2000 bytes is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ______ msec. (Assume 1K = 1000)
Answer: 325
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
Q5.Which of the following OSI layers is responsible for end-to-end reliable data transfer?
a. Physical layer
b. Transport layer
C. Network layer
d. Datalink layer
Answer: b. Transport layer
Q6.Which of the following statement(s) is/are true for the IP address?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
C. It indicates how many hardware ports are there in the computer system.
d. None of these.
Answer:a. It uniquely identifies a network interface of a computer system.
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
Q7.How many bits are used for IP address (in IPv4) and port number respectively?
a. 32,8
b. 32, 16
c. 128,8
d. 128, 16
Answer: b. 32, 16
Q8.Which of the following is not a valid port numbers in TCP/IP?
a. 21
b. 80
C. 443
d. 8080
e. 80800
Answer: e. 80800
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
Q9.If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal) _____
?
Answer: 7
Q10 .The minimum size of IP header required in an IP datagram is ______ bytes.
Answer: 20
For answers or latest updates join our telegram channel: Click here to join
These are Ethical Hacking Nptel Week 1 Assignment Answers
More Weeks of Ethical Hacking: Click here
More Nptel Courses: https://progiez.com/nptel-assignment-answers










