Ethical Hacking Week 1 NPTEL Assignment Answers 2025

Need help with this week’s assignment? Get detailed and trusted solutions for Ethical Hacking Week 1 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.

✅ Subject: Ethical Hacking
📅 Week: 1
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students

For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Ethical Hacking Week 1 NPTEL Assignment Answers

🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!

NPTEL Ethical Hacking Week 1 Assignment Answers 2025

1. What is the main objective of ethical hacking?

a. Deletes files from a system.
b. Inserts malwares in a system.
c. Legally Identify system vulnerabilities.
d. Steal sensitive information.

Answer : For Answers Click Here 

2. Which of the following are types of penetration testing methodologies?

a. White Box
b. Black Box
c. Red Box
d. Trojan Horse

Answer :

3. Which of the following switching techniques is more efficient for bursty data traffic?

a. Circuit Switching
b. Message Switching
c. Packet Switching
d. None of these

Answer :

4. Which protocol in TCP/IP is connectionless and does not provide reliability?

a. TCP
b. UDP
C. FTP
d. TELNET

Answer :

5. Which IP header field prevents infinite looping of packets?

a. Header Checksum
b. Time to Live
c. Fragment offset
d. HLEN

Answer : For Answers Click Here 

6. What are the responsibilities of the IP layer?

a. Framing
b. Route packets
C. Provide reliable transmission
d. None of these

Answer :

7. Which of the following is/are not a valid field of IP header?

a. TIL
b. Port Number
c. Protocols
d. MAC address

Answer :

8. Which of the following statements is/are true about datagram packet switching?

a. Requires prior route establishment.
b. Faster for fewer packet.
c. Uses dynamic routing.
d. All packets follow the same path.

Answer :

9. The max value (in decimal) for HLEN field (header length) is____________.

Answer :

10. The header checksum field in the IP header is__________bits wide.

Answer : For Answers Click Here 

NPTEL Ethical Hacking Week 1 Assignment Answers 2024

1. In which of the following penetration testing models, no information about the network is given to the tester?

a. White box model
b. Black box model ✅
c. Gray box model
d. Red box model

Answer: b. Black box model
Explanation: In the black box model, the tester simulates an external attacker with no prior knowledge of the network. It is used to identify vulnerabilities from an outsider’s perspective.


2. Which of the following statements is/are true for a circuit switched network?

a. A communication link may be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections. ✅
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. It is more efficient for bursty traffic.

Answer: b
Explanation: In circuit switching, a dedicated communication path is reserved between sender and receiver for the entire session, so it can’t be shared. It’s not efficient for bursty traffic.


3. Which of the following statements is/are false for virtual circuit-based packet transfer approach?

a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.

Answer: b, d
Explanation:

  • (b) is false because in virtual circuits, the route is fixed; dynamic routing is not used once the connection is established.
  • (d) is false because virtual circuit is a hybrid of circuit and packet switching—not a pure packet-switched method.

4. A packet of size 2000 bytes is sent over a 50 Kbps point-to-point link whose propagation delay is 5 msec. The packet will reach after:

Answer: 325 msec
Calculation:

  • Transmission Time = (2000 bytes × 8 bits) / 50,000 = 320 ms
  • Total Delay = Transmission time + Propagation delay = 320 + 5 = 325 ms

5. Which of the following OSI layers is responsible for end-to-end reliable data transfer?

a. Physical layer
b. Transport layer ✅
c. Network layer
d. Data Link layer

Answer: b. Transport layer
Explanation: The transport layer ensures end-to-end communication, error detection, and reliable data transfer (like TCP).


6. Which of the following statements is/are true for the IP address?

a. It uniquely identifies a network interface of a computer system. ✅
b. It uniquely identifies a host in the network.
c. It indicates how many hardware ports are there in the computer system.
d. None of these.

Answer: a
Explanation: IP address identifies a network interface, not the entire host. A host may have multiple interfaces (and thus IPs).


7. How many bits are used for IP address (in IPv4) and port number respectively?

a. 32, 8
b. 32, 16 ✅
c. 128, 8
d. 128, 16

Answer: b. 32, 16
Explanation:

  • IPv4 address = 32 bits
  • Port number = 16 bits

8. Which of the following is not a valid port number in TCP/IP?

a. 21
b. 80
c. 443
d. 8080
e. 80800

Answer: e. 80800
Explanation: Valid port range is 0 to 65535. So, 80800 is invalid.


9. If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal)?

Answer: 7
Explanation:

  • HLEN is the header length in 32-bit words.
  • 224 bits / 32 = 7 → So, HLEN = 7

10. The minimum size of IP header required in an IP datagram is

Answer: 20 bytes
Explanation:
Minimum IP header has 5 fields (each 4 bytes): 5 × 4 = 20 bytes