Ethical Hacking | Week 2
Course Name: Ethical Hacking
Course Link: Click Here
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
Q1. Which of the following is/are false for IP fragmentation?
a. It is a process that divides packets into smaller fragments.
b. Fragmentation is required due to intermediate networks with smaller maximum transmission unit (MTU).
c. Each fragmented packet is considered as separate IP packet.
d. IP fragmentation is typically done by layer-2 switches.
e. None of these.
Answer: d. IP fragmentation is typically done by layer-2 switches.
Q2. Consider the following statements:
(i) In transparent fragmentation, all fragmented packets are reassembled by an exit router.
(ii) In non-transparent fragmentation, all fragmented packets reassembled by host.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer: c. Both (i) and (ii) are true.
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
Q3. For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used by IP?
a. Fragment offset.
b. Flags.
c. Header checksum.
d. HLEN.
e. Identification.
Answer: a, b, e
Q4. An IP packet arrives at a router with the first eight bits as 01001100. How many bytes are there in the OPTIONS field
Answer: 28
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
Q5. In an IP packet, the value of HLEN is 6, and the value of the TOTAL LENGTH field is 1000 (one thousand). The number of data bytes in the packet will be _______.
Answer: 976
Q6. Which of the following is/are true for IP addressing?
a. Each host connected to the Internet is defined by an IP address.
b. IP address consist of two parts : network number and host number.
c. When a packet is routed to the destination network, only the host number is used.
d. Class A address can have a maximum of 16,777,214 networks.
e. None of these.
Answer: a, b
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
Q7. Which of the following is/are not a feature of TCP?
a. Process to process communication.
b. Stream delivery service.
c. Connection-oriented service.
d. Unreliable service.
e. Full duplex communication.
f. None of these.
Answer: d
Q8. Which of the following statement(s) is/are false for flag bits in TCP header?
a. SYN=1 and ACK=1 represents a connection request message.
b. SYN=1 and ACK=0 represents a connection confirmation message.
c. RST bit is used to reject connection request.
d. PUSH bit is used to indicate end of a message
e. None of these.
Answer: a, b
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
Q9. What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.242.0?
a. 144.16.32.0
b. 144.16.34.0
c. 144.16.34.255
d. 144.16.242.0
e. 144.16.242.255
Answer: b. 144.16.34.0
Q10. An organization is allotted a block with beginning address as: 144.16.192.16/28 in CIDR notation. What will be the address range for that block?
a. 144.16.192.0 to 144.16.192.16
b. 144.16.192.0 to 144.16.192.255
c. 144.16.192.16 to 144.16.192.31
d. 144.16.192.16 to 144.16.192.32
Answer: c
These are NPTEL Ethical Hacking Week 2 Assignment 2 Answers
More Solutions of Ethical Hacking: Click Here
More NPTEL Solutions: https://progiez.com/nptel/

This content is uploaded for study, general information, and reference purpose only.