Ethical Hacking | Week 10

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers


Q1. Which of the following is/are true for black box testing kind of attack?
a. It is an invasive type of attack.
b. It is a non-invasive type of attack.
c. The attacker has information about the implementation details.
d. Itrelies on weakness of implementation

Answer: b


Q2. What are the typical countermeasures to prevent hardware-based attacks?
a. We obfuscate data in registers and buses.
b. We add preventive measures against side-channel attacks.
c. We provide authentication using physical unclonable functions.
d. We use a very secure cryptographic algorithm.

Answer: a, b, c


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers


Q3. Which of the following statement(s) is/are true for side channel attacks?
a. They exploit some weakness in the algorithm.
b. They exploit some weakness in the implementation of the algorithm.
c. They require physical access to the device.
d. They only require the set of inputs/outputs to the algorithm.

Answer: b, c


Q4. Which of the following side channel(s) is/are typically exploited in side-channel attacks?
a. Electromagnetic emissions.
b. Time taken to execute an algorithm.
c. The time and space complexities of an algorithm.
d. Power consumed during computation.
e. All of these.

Answer: a, b, d


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers


Q5. For modular exponentiation computation of x7, how many squaring and multiplication operations would be required?
a. 4 and 4.
b. 4 and 2.
c. 3 and 2.
d. 3 and 1.
e. None of these.

Answer: e. None of these.


Q6. What does power analysis do?
a. It measures variation in power consumption during a computation.
b. It attacks the power supply and feeds power to the circuit.
c. lt relies on the use of a hardware Trojan in the circuit.
d. All of these.

Answer: a. It measures variation in power consumption during a computation.


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers


Q7. Which of the following strategies can help to prevent power analysis attacks?
a. The computation times in the different branches of conditional statements must be unequal.
b. The computation times in the different branches of conditional statements must be the same.
c. We can use a random noise generator in the circuit.
d. We obfuscate the scan chains in the circuit.

Answer: b, c


Q8. What is the meaning of PUF?
a. Perfect Universal Function
b. Physically Unclonable Function
c. Polynomially Unclonable Function
d. None of these.

Answer: b. Physically Unclonable Function


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers


Q9. Which of the following is/are true for hardware Trojan?
a. It incurs small hardware overhead.
b. It is stealthy and usually difficult to detect.
c. It relies on a number of malicious nodes to mount attacks.
d. It is used to reduce power consumption.

Answer: a, b


Q10. What are some of the software-based countermeasures to prevent timing-based side-channel attack?
a. Use a structured programming language for implementation.
b. Mask the data representation.
c. Introduce redundant computations as required.
d. All of these.

Answer: b, c


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers



These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are NPTEL Ethical Hacking Week 10 Assignment 10 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.