Ethical Hacking | Week 11

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers


Q1. Which of the following Metasploit module(s) can be used to establish communication channel
between Metasploit framework and target system?

a. Exploit
b. Payload
c. Auxiliary
d. Encoder
e. msfvenum

Answer: b. Payload


Q2. Which of the following command is used to launch Metasploit framework?
a. msfconsole
b. msfvenum
c. Metasploit
d. None of these.

Answer: a. msfconsole


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers


Q3. In Metasploit to check the compatible target (OS) for any exploit, which of the following command (option) is used?
a. Show targets
b. Set payloads
c. Set targets
d. Show payloads
e. None of these.

Answer: a. Show targets


Q4. We can execute basic commands and tools inside Metasploit console.
a. True
b. False

Answer: a. True


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers


Q5. Which of the following commands can be used to get user account details in Metasploit framework?
a. getsystem
b. hashdump
c. getuser
d. msfvenum

Answer: b. hashdump


Q6. Which of the following types of attacks are possible on a webservers/web applications?
a. Denial-of-Services
b. Cross-Site-Scripting
c. SQL Injection
d. Session Hijacking
e. None of these.

Answer: a, b, c, d


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers


Q7. Which of the following tools uses brute-force attack to extract existing and hidden page of a webserver?
a. Dirb
b. sQL MAP
c. Hydra
d. Crunch
e. None of these

See also  Ethical Hacking | Week 3

Answer: a. Dirb


Q8. If any web page is vulnerable to error based sql injection, then which of the following is true?
a. It will print error message for incorrect user input.
b. It will not print anything for incorrect user input.

Answer: a. It will print error message for incorrect user input.


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers


Q9. Which of the following SQLMAP options is used to list all users along with hashed password?
a. –users
b. — passwords
c. –user-pass
d. –user-privileges

Answer: b. — passwords


Q10. What are some of the software-based countermeasures to prevent timing-based side-channel attack?
a. Use a structured programming language for implementation.
b. Mask the data representation.
c. Introduce redundant computations as required.
d. All of these.

Answer: a. Use a structured programming language for implementation.


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers



These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are NPTEL Ethical Hacking Week 11 Assignment 11 Answers