Ethical Hacking | Week 9
Course Name: Ethical Hacking
Course Link: Click Here
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
Q1. Which of the following statement(s) is/are true for sniffing?
a. Itis a process of analyzing network activity by capturing network traffic.
b. Itis a process of finding the vulnerability in a network.
c. Itis a process used for user enumeration.
d. None of these.
Answer: a. Itis a process of analyzing network activity by capturing network traffic.
Q2. Consider the following statements.
(i) Burp suite is a popular tool used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.
a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer: c. Both (i) and (ii) are true.
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
Q3. What is the purpose of repeater module available in burp suite?
a. Itis used to mount password attack.
b. Itis used for manipulating and reissuing packets and to analyze their response.
c. Itis used for creating dictionary.
d. None of these.
Answer: b. Itis used for manipulating and reissuing packets and to analyze their response.
Q4. Which of the following approach(es) cannot protect against sniffing?
a. Restrict physical access to the network media.
b. Permanently add the MAC address of gateway to ARP cache.
c. Use encryption to protect confidential information.
d. Use dynamic IP address and ARP entries.
e. None of these.
Answer: d. Use dynamic IP address and ARP entries.
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
Q5. Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Pop-up windows
e. Chain letters
f. phishing
Answer: a, b, c
Q6. Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof
Answer: d. SEToolkit
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
Q7. Which of the following protocols is/are not vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. SSH
d. SSL
Answer: c, d
Q8. Which of the following can be used as a countermeasure for DoS/DDoS attack?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
e. None of this.
Answer: a, b, c, d
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
Q9. Which of the following tool/approach cannot be used to perform DoS attack?
a. Hping3 tool
b. “http-slowloris” nmap script
c. LOIC tool
d. Hydra and Crunch.
Answer: d. Hydra and Crunch.
Q10. For mounting DoS attack using hping3 tool how many packets will be send per second if we use –faster option?
a. 10
b. 100
c. 1000
d. 10000
Answer: b. 100
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers
More Solutions of Ethical Hacking: Click Here
More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/