NPTEL Ethical Hacking Assignment Week 3 Answers 2023

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Ethical Hacking Assignment Solution 2023

NPTEL Ethical Hacking Assignment Week 3 Answers 2023

NPTEL Ethical Hacking Week 3 Assignment Answers 2023

1. Consider the following statements:
(i) In connection-oriented approach, network layer first makes a connection.
(il) IP protocol uses connection-oriented routing.

a. Only (i) is true
b. Only (ji) is true
c. Both i) and (ii) are true.
d. Both (i) and (i) are false.

Answer :- a

2. Which of the following is/are true for default route?

a. Default route is used when no specific address for next hop is available.
b. In routing table default route is specified by an address 0.0.0.0.
c. In routing table default route is specified by an address 255.255.255.255
d. In routing table default route is specified by an address 127.0.0.1.
e. None of these.

Answer :- a, b

3. Which of the following is/are true for static routing?

a. In static routing routes are user defined.
b. In static routing, routing table updates periodically depending on the network condition.
c. Static routing is easy to configure.
d. None of these.

Answer :-  For Answer Click Here

4. Which of the following routing flags indicates that the router is up and running?

a. U
b. G
c. H
d. D
e. M

Answer :- For Answer Click Here

5. Which of the following statements) is/are true for interior routing protocol?

a. All the participating routers are present in the same autonomous system.
b. The participating routers are present in different autonomous systems.
c. Routers in different autonomous systems exchange messages to update their routing tables.
d. Routers in the same autonomous system exchange messages to update their routing tables.

Answer :- For Answer Click Here

6. Which of the following statements) is/are false for Routing Information Protocol (RIP)?

a. RIP is an example of interior routing protocol.
b. RIP maintains timers to detect failed links.
c. RIP converges faster for large networks.
d. RIP consumes high bandwidth to update routes.
e. None of these.

Answer :- For Answer Click Here

7. Which of the following is/are false for Border Gateway Protocol (BGP)?

a. BGP allows routers belonging to different autonomous systems to exchange routing information.
b. BGP uses TCP connection to send routing messages.
c. BGP can also be used by routers within the same autonomous systems.
d. BGP sends keepalive messages periodically to ensure that the connection between the BGP peers is alive.
e. None of these.

Answer :- For Answer Click Here

8. If a packet is to be delivered to a specific host in a network, what kind of address should be used to specify the destination?

a. Unicast address.
b. Broadcast address.
c. Anycast address.
d. None of these.

Answer :- For Answer Click Here

9. Which of the following is not true for IPv6?

a. It uses 32-bit IP addresses.
b. IPv6 address does not have any defined classes.
c. It uses 128-bit IP addresses.
d. None of these.

Answer :- For Answer Click Here

10. Consider the following routing table in a router. On which interface will an IP packet with destination address 161.44.64.120 be forwarded?

NPTEL Ethical Hacking Assignment Week 3 Answers 2023

a. Interface a
b. Interface b
c. Interface c
d. Interface d
e. Interface e

Answer :-  For Answer Click Here

NPTEL Ethical Hacking Week 2 Assignment Answers 2023

1. Why there is a need for fragmentation of IP packets?

a. Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.
b. Fragmentation is necessary for faster data transfer.
c. Fragmentation is necessary for error-recovery and flow control.
d. All of these.

Answer :- a.) Fragmentation is necessary because every network has a unique limit for the maximum size of datagrams that it can process.

IP fragmentation occurs when a large IP packet needs to be transmitted over a network that has a smaller Maximum Transmission Unit (MTU) size. Different networks and technologies have varying MTU sizes due to factors like link-layer protocols and network infrastructure. If an IP packet is larger than the MTU of a particular network segment, it needs to be divided into smaller fragments to ensure successful transmission across that network.

2. Which of the following statements) is/are true?

a. In transparent fragmentation the subsequent networks are aware that the fragmentation had occurred.
b. In transparent fragmentation, it is required to route all packet to the same exit router in a network.
c. In non-transparent fragmentation, each fragment is treated as an independent packet.
d. In non-transparent fragmentation, an exit router reassembles all fragmented packets.

Answer :- b. In transparent fragmentation, it is required to route all packet to the same exit router in a network. 

c. In non-transparent fragmentation, each fragment is treated as an independent packet.

3. An IP packet arrives at the final destination with the M flag set as 1. Which of the following statement is true about the packet?

a. Prevents the fragmentation from taking place.
b. The packet will be fragmented by the next router.
c. The packet represents a fragment of a larger packet.
d. None of these.

Answer :- c. The packet represents a fragment of a larger packet.

4. Which of the following statements) is/are false for IP address?

a. IP address is 32-bit quantity.
b. IP address is typically expressed as dotted decimal notation where dots are used to separate each of the four octets of the address.
c. IP address consists of three logical parts: network number, host number and port number.
d. None of these.

Answer :- c. IP address consists of three logical parts: network number, host number and port number.

5. Which address classes do the IP addresses 144.16.75.12 and 10.10.85.120 belong to?

a. Class C and Class A
b. Class B and Class C
c. Class B and Class A
d. Class B and Class D

Answer :- c. Class B and Class A 

6. Which of the following IP addresses represent broadcast address?

а. 144.15.255.255
b. 144.16.0.255
c. 202.0.255.250
d. 202.0.255.255

Answer :- a, d

7. The maximum number of hosts that are possible in a class C network is_________.

Answer :- 254

8. What is a TCP half-open connection in the context of connection establishment using 3-way handshake?

a. The first transaction does not complete.
b. The second transaction does not complete.
c. The first transaction does not complete but the second transaction completes.
d. The last transaction does not complete.
e. None of these.

Answer :- d

9. In the TCP header field, what do SYN=1 and ACK=0 represent?

a. Connection request message.
b. Connection confirmation message.
c. Reject connection request.
d. Reset connection request.

Answer :- a

10. What is the subnet address if the destination IP address is 144.16.75.105 and the subnet mask is 255.255.240.0?

a. 144.16.32.0
b. 144.16.75.0
c. 144.16.16.0
d. None of these

Answer :- d

NPTEL Ethical Hacking Week 1 Assignment Answers 2023

1. Which of the following points) is/are true for an ethical hacker?

a. An ethical hacker intends to gain unauthorized access to a resource for financial gain or personal recognition.
b. An ethical hacker defaces websites or crash backend servers for fun, reputation damage or to cause financial loss.
C. An ethical hacker is not concerned with improving the organization’s security posture.
d. None of these.

Answer :- d

2. Which of the following statement(s) is/are true?

a. In the black box model, the tester has complete information about the network.
b. In the white box model, the tester does not have any information about the network.
c. In the gray box model, the tester has partial information about the network.
d. None of these.

Answer :- c

3. Which of the following statement(s) is/are false for a packet switched network?

a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
C. It is efficient for busty traffic.
d. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.

Answer :- b

4. Which of the following statements) is/are true for datagram-based packet transfer approach?

a. It is a connection-less packet switching approach, where no route is established priori to transfer of packets.
b. In this approach, each packet is transmitted as an independent entity.
c. In this approach each intermediate node can perform dynamic routing.
d. In this approach all the packets reach in order to the destination.

Answer :- a, b, c

5. What is the purpose of the port number in TCP/IP networks?

a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
c. It uniquely identifies a running application on a specific host in the network.
d. It indicates how many hardware ports are there in the computer system. e. None of these.

Answer :- c

6. Which of the following is not a valid port numbers in TCP/IP?

a. 21
b. 80
c. 443
d. 8080
e. 80800

Answer :- e

7. Which of the following functionality does Address Resolution Protocol (ARP) perform?

a. Map IP addresses to hardware (MAC) addresses.
b. Map hardware addresses (MAC) to IP addresses.
c. Performs error control and correction.
d. Breaks the packet into smaller packets, if required.

Answer :- a

8. Which of the following statements) is/are false?

a. IP provides connectionless, unreliable delivery systems for packets.
b. UDP provides connectionless, unreliable delivery systems for packets
c. TCP provides connectionless, unreliable delivery systems for packets.
d. None of these.

Answer :- c

9. If the IP header is 96 bits long, what will be the value (in decimal) of the “HLEN” field ?

Answer :- 3

10. The maximum size of data that can be accommodated in an IP datagram is bytes.

Answer :- 65515

Important Links

Follow us & Join Our Groups for Latest Information
Updated by US
🔥Follow US On Google NewsClick Here
🔥WhatsApp Group Join NowClick Here
🔥Join US On TelegramClick Here
🔥WebsiteClick Here

Leave a comment