Ethical Hacking | Week 9

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers


Q1. Which of the following statement(s) is/are true for sniffing?
a. Itis a process of analyzing network activity by capturing network traffic.
b. Itis a process of finding the vulnerability in a network.
c. Itis a process used for user enumeration.
d. None of these.

Answer: a. Itis a process of analyzing network activity by capturing network traffic.


Q2. Consider the following statements.
(i) Burp suite is a popular tool used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.

a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer: c. Both (i) and (ii) are true.


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers


Q3. What is the purpose of repeater module available in burp suite?
a. Itis used to mount password attack.
b. Itis used for manipulating and reissuing packets and to analyze their response.
c. Itis used for creating dictionary.
d. None of these.

Answer: b. Itis used for manipulating and reissuing packets and to analyze their response.


Q4. Which of the following approach(es) cannot protect against sniffing?
a. Restrict physical access to the network media.
b. Permanently add the MAC address of gateway to ARP cache.
c. Use encryption to protect confidential information.
d. Use dynamic IP address and ARP entries.
e. None of these.

Answer: d. Use dynamic IP address and ARP entries.


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers


Q5. Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Pop-up windows
e. Chain letters
f. phishing

Answer: a, b, c


Q6. Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof

Answer: d. SEToolkit


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers


Q7. Which of the following protocols is/are not vulnerable to sniffing attack?
a. HTTP
b. Telnet
c. SSH
d. SSL

Answer: c, d


Q8. Which of the following can be used as a countermeasure for DoS/DDoS attack?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.
c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
e. None of this.

Answer: a, b, c, d


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers


Q9. Which of the following tool/approach cannot be used to perform DoS attack?
a. Hping3 tool
b. “http-slowloris” nmap script
c. LOIC tool
d. Hydra and Crunch.

Answer: d. Hydra and Crunch.


Q10. For mounting DoS attack using hping3 tool how many packets will be send per second if we use –faster option?
a. 10
b. 100
c. 1000
d. 10000

Answer: b. 100


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers



These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: http://13.235.254.184/nptel/


These are NPTEL Ethical Hacking Week 9 Assignment 9 Answers