Need help with this week’s assignment? Get detailed and trusted solutions for Ethical Hacking Week 2 NPTEL Assignment Answers. Our expert-curated answers help you solve your assignments faster while deepening your conceptual clarity.
✅ Subject: Ethical Hacking
📅 Week: 2
🎯 Session: NPTEL 2025 July-October
🔗 Course Link: Click Here
🔍 Reliability: Verified and expert-reviewed answers
📌 Trusted By: 5000+ Students
For complete and in-depth solutions to all weekly assignments, check out 👉 NPTEL Ethical Hacking Week 2 NPTEL Assignment Answers
🚀 Stay ahead in your NPTEL journey with fresh, updated solutions every week!
NPTEL Ethical Hacking Week 2 Assignment Answers 2025
1. Why do we need fragmentation?
a. To increase transmission speed.
b. Due to varying MTU across networks.
c. To improve encryption.
d. To compress packet.
Answer : See Answers
2. IP fragmentation is typically done by:
a. Source Host
b. Destination Host
c. Intermediate Routers
d. Hubs
Answer :
3. For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used?
a. Fragment offset
b. Flags
c. Port number
d. Checksum
e. Identification
Answer :
4. An IP packet arrives at the final destination with the D flag set as 0, M flag set as 1 and offset is set to 0. Which of the following statements is true about the packet?
a. The packet has not been fragmented.
b. The packet has been fragmented and it is the first fragment.
c. The packet has been fragmented and it is the last fragment.
d. None of these.
Answer :
5. In an IP packet, the value of HLEN is 15, and the total size of IP packet is 2000 bytes. The
number of data bytes in the packet will be________________.
Answer :
6. Which address classes do the IP addresses 128.0.1.3 and 193.11.23.10 belong to?
a. Class A and Class B
b. Class B and Class C
c. Class C and Class D
d. Class A and Class C
Answer : See Answers
7. Which IP addresses are reserved for private use?
a. 10.x.x.x
b. 172.32.x.x
C. 192.168.x.x
d. 128.x.x.x
Answer :
8. What does a TCP segment with SYN =1 and ACK = 0 indicate?
a. Connection termination
b. Connection reset
c. Keep-alive signal
d. Initial connection request
e. Connection acknowledgement
Answer :
9. What is the size of UDP header?
a. 16 bits
b. 16 bytes
C. 8 bits
d. 8 bytes
Answer :
10. What is the subnet address if the destination IP address is 192.168.77.213 and the subnet mask is 255.255.252.0?
a. 192.168.76.0
b. 192.168.76.213
c. 192.168.77.0
d. 192.168.0.0
Answer : See Answers
NPTEL Ethical Hacking Week 2 Assignment Answers 2024
1. Which of the following statement(s) is/are true for transparent fragmentation?
Options:
a. The subsequent networks are aware that the fragmentation has occurred.
b. It is required to route all packets to the same exit router in a network.
c. Each fragment is treated as an independent packet.
d. All fragmented packets are reassembled by host system.
e. All fragmented packets are reassembled by the exit router.
✅ Answer: b, e
Explanation:
In transparent fragmentation, the fragmented packets are reassembled before leaving the network (i.e., at the exit router), so the subsequent networks are not aware that fragmentation occurred. Since reassembly happens inside the network, all fragments must go through the same exit router, making option b and e correct.
2. For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used by IP?
Options:
a. Fragment offset
b. Flags
c. Header checksum
d. HLEN
e. Identification
✅ Answer: a, b, e
Explanation:
- Fragment offset tells where each fragment fits in the original data.
- Flags (especially the “More Fragments” flag) indicate if more fragments follow.
- Identification helps to group all fragments of the same packet together.
Hence, these three fields are essential for reassembly.
3. An IP packet arrives at the final destination with the D flag set as 1. Which of the following statement is true about the packet?
Options:
a. The packet has not been fragmented.
b. The packet has been fragmented and it is the first fragment.
c. The packet has been fragmented and it is the last fragment.
d. None of these.
✅ Answer: a
Explanation:
The D flag (Don’t Fragment), when set to 1, instructs the network not to fragment the packet. If such a packet arrives at the destination, it must not have been fragmented. Hence, option a is correct.
4. In an IP packet, the value of HLEN is 8, and the total size of IP packet is 1500 bytes. The number of data bytes in the packet will be_________.
✅ Answer: 1470, 1466
Explanation:
- HLEN = 8 means header length = 8 × 4 = 32 bytes
- Total IP packet size = 1500 bytes
- Therefore, data = 1500 – 32 = 1468 bytes
This can slightly vary depending on implementation; hence 1466 and 1470 can both be acceptable estimates.
5. Which of the following statement(s) is/are false for IP addressing?
Options:
a. Each host connected to the Internet is defined by an IP address.
b. IP address consists of two parts: network number and host number.
c. When a packet is routed to the destination network, only the network number is used.
d. None of these.
✅ Answer: d
Explanation:
All the given statements are true, hence the false statement is ‘None of these’.
6. Which address classes do the IP addresses 10.16.75.12 and 192.10.85.120 belong to?
Options:
a. Class A and Class B
b. Class B and Class C
c. Class C and Class D
d. Class A and Class C
✅ Answer: d
Explanation:
- 10.16.75.12 → falls in Class A (1–126)
- 192.10.85.120 → falls in Class C (192–223)
So, d. Class A and Class C is correct.
7. Which of the following IP addresses does not represent broadcast address?
Options:
a. 10.0.0.255
b. 10.255.255.255
c. 144.16.255.255
d. 173.16.0.255
e. 192.168.5.255
f. 192.168.255.0
✅ Answer: a, d, f
Explanation:
A broadcast address typically has all host bits set to 1. The IPs a, d, and f do not follow the standard broadcast pattern in their likely subnet, so they are not broadcast addresses.
8. Which of the following statement(s) is/are false for flag bits in TCP header?
Options:
a. SYN=1 and ACK=0 represents a connection request message.
b. SYN=1 and ACK=1 represents a connection confirmation message.
c. RST bit is used to reset/reject connection request.
d. None of these.
✅ Answer: d
Explanation:
All statements are correct, so the false option is ‘None of these’.
9. What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.242.0?
Options:
a. 144.16.32.0
b. 144.16.34.0
c. 144.16.34.255
d. 144.16.242.255
✅ Answer: a
Explanation:
- Subnet mask 255.255.242.0 → In binary, this is 11111111.11111111.11110010.00000000
- Perform a bitwise AND of the IP and subnet mask to get 144.16.32.0
10. An organization is allotted an address block with beginning address as: 144.16.192.24/29 in CIDR notation. What will be the address range for that block?
Options:
a. 144.16.192.0 to 144.16.192.8
b. 144.16.192.8 to 144.16.192.16
c. 144.16.192.16 to 144.16.192.24
d. 144.16.192.24 to 144.16.192.31
✅ Answer: d
Explanation:
CIDR /29 → means 2³ = 8 IP addresses in that block.
Starting at 144.16.192.24, the range is:
144.16.192.24 to 144.16.192.31


