Ethical Hacking | Week 3

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers


Q1. Which of the following statement(s) is/are true?
a. IP protocol uses connection-oriented routing.
b. IP protocol uses connection-less routing.
c. IP protocol is a host-to-host layer.
d. In connection-less routing, each packet is treated as an independent packet. e. None of these.

Answer: b, d


Q2. Which of the following is/are false for direct and indirect packet delivery option?
a. Direct delivery occurs when the destination host and deliverer are not present on same network.
b. Indirect delivery occurs when the destination host and deliverer are present on same network.
c. In direct delivery, hosts of same network can exchange packets without interference of router.
d. In direct delivery, an incoming packet to the router is forwarded to the destination host present in the network.
e. In an indirect delivery, the packet goes from router to router until it reaches the one connected to the same physical network as its final destination.
f. None of these.

Answer: a, b


These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers


Q3. Which of the following routing flags can indicate route to a single host (and not to a network) in the routing table?
a. U
b. G
c. H
d. D
e. M

Answer: c. H


Q4. Which of the following statement(s) is/are false?
a. Autonomous systems are set of routers and networks managed by a single organization.
b. In exterior routing protocol, all the participating routers are present in the same autonomous system.
c. In interior routing protocol, the participating routers can be present in different autonomous systems.
d. None of these.

Answer: b, c


These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers


Q5. In Open Shortest Path First (OSPF) routing approach, which of the following packets is used to check if the neighbor router is up or not?
a. Link State Request.
b. Link Request Update.
c. Link State Acknowledgement.
d. Using TCP 3-way handshake protocol.
e. None of these.

Answer: e. None of these.


Q6. If a packet is to be delivered to all the hosts in a network, what kind of address should be used to specify the destination?
a. Unicast address.
b. Broadcast address.
c. Anycast address.
d. None of these.

Answer: b. Broadcast address.


These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers


Q7. How many bits are used to represent IPv4 and IPv6 addresses respectively?
a. 4, 24
b. 24, 32
c. 32, 64
d. 32, 128
e. 255, 255

Answer: d. 32, 128


Q8. When an entire IPv6 packet is included as payload inside an IPv4 packet, it is called
a. Encapsulation
b. Tunneling
c. Decapsulation
d. None of these

Answer: b. Tunneling


These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers


Q9. The size of base header in IPv6 datagram packet is _______ bytes.

Answer: 40


Q10. Consider the following routing table in a router. On which interface will an IP packet with destination address 144.25.112.40 be forwarded?

image 10

a. Eth0
b. Eth1
c. Eth2
d. Eth3
e. Def

Answer: d. Eth3



These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are NPTEL Ethical Hacking Week 3 Assignment 3 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.