Course Content
Week 1 Answers 2023 (Free)
0/1
Week 2 Answers 2023
0/1
Week 3 Answers 2023
0/1
Week 4 Answers 2023
0/1
Week 5 Answers 2023
0/1
Week 6 Answers 2023
0/1
Week 7 Answers 2023
0/1
Week 8 Answers 2023
0/1
Week 9 Answers 2023
0/1
Week 10 Answers 2023
0/1
Week 11 Answers 2023
0/1
Week 12 Answers 2023
0/1
PYQ [Week 1-12] NPTEL Ethical Hacking Assignment Answers 2023
    About Lesson

    1. Which of the following points) is/are true for an ethical hacker?

    a. An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition.
    b. An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss.
    C. An ethical hacker is not concerned with improving the organization’s security posture.
    d. None of these.

    Answer :- d

    2. Which of the following statement(s) is/are true?

    a. In the black box model, the tester has complete information about the network.
    b. In the white box model, the tester does not have any information about the network.
    c. In the gray box model, the tester has partial information about the network.
    d. None of these.

    Answer :- c

    3. Which of the following statement(s) is/are false for a packet switched network?

    a. A communication link can be shared by more than one connection.
    b. A communication link is dedicated to a connection and cannot be shared with other connections.
    C. It is efficient for busty traffic.
    d. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.

    Answer :- b

    4. Which of the following statements) is/are true for datagram-based packet transfer approach?

    a. It is a connection-less packet switching approach, where no route is established priori to transfer of packets.
    b. In this approach, each packet is transmitted as an independent entity.
    c. In this approach each intermediate node can perform dynamic routing.
    d. In this approach all the packets reach in order to the destination.

    Answer :- a, b, c

    5. What is the purpose of the port number in TCP/IP networks?

    a. It uniquely identifies a network interface of a computer system.
    b. It uniquely identifies a host in the network.
    c. It uniquely identifies a running application on a specific host in the network.
    d. It indicates how many hardware ports are there in the computer system. e. None of these.

    Answer :- c

    6. Which of the following is not a valid port numbers in TCP/IP?

    a. 21
    b. 80
    c. 443
    d. 8080
    e. 80800

    Answer :- e

    7. Which of the following functionality does Address Resolution Protocol (ARP) perform?

    a. Map IP addresses to hardware (MAC) addresses.
    b. Map hardware addresses (MAC) to IP addresses.
    c. Performs error control and correction.
    d. Breaks the packet into smaller packets, if required.

    Answer :- a

    8. Which of the following statements) is/are false?

    a. IP provides connectionless, unreliable delivery systems for packets.
    b. UDP provides connectionless, unreliable delivery systems for packets
    c. TCP provides connectionless, unreliable delivery systems for packets.
    d. None of these.

    Answer :- c

    9. If the IP header is 96 bits long, what will be the value (in decimal) of the “HLEN” field ?

    Answer :- 3

    10. The maximum size of data that can be accommodated in an IP datagram is bytes.

    Answer :- 65515
    0% Complete