NPTEL Ethical Hacking Week 4 Assignment Answers 2023

NPTEL Ethical Hacking Week 4 Assignment Answers 2023
Q1. Which of the following statements) is/are true for NAT networking mode?
a. In NAT mode, the virtual machines cannot access each other.
b. NAT mode does not allow access of internet to the installed virtual machines.
c. In NAT mode, the hypervisor allocate same IP address to all virtual machines.
d. All of these.
Answer:- a, c
Q2, Which of the following statements) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Answer:- a, d
Q3. Which of the following can be used for active reconnaissance.
a. Whois
b. Archive.org
C. NMAP
d. Nessus
e. Metasploit
f. Hydra
Answer:- c, d, e
Q4. Which of the following information cannot be retrieved using active reconnaissance?
a. Live host in a network.
b. Open ports.
c. Services running in the systems.
d. Operating system of the target system.
e. Vulnerabilities of target machine/application.
f. None of these.
Answer:- f
Q5. Which of the following tools cannot be used for DNS enumeration?
a. host
b. dnsenum
c. dig
d. None of these
Answer:- d
Q6. What is the main objective of host discovery?
a. Identification of live hosts.
b. Identification of services running in the target system.
c. Identification of version of the services running in the target system.
d. Identification of the operating system of the target systems.
e. Identification of open ports.
Answer:- a
Q7. Which of the following options is used to trace the details of the sent/received packets?
a. –packet-trace
b. –reason
C. -disable-arp-ping
d. None of these
Answer:- a
Q8. Which of the following options can be used to perform IMP ECHO sweep?
a. -PE
b. -PP
C. -PM
d. -PU
Answer:- a
Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- d
Q10. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a. RST
b. ACK
c. SYN-ACK
d. SYN
Answer:- b
Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a. An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b. An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
C. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d. An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer:- a, b
Q12. Can the use of firewall prevent port/host scanning?
a. True
b. False
Answer:- a
Q13. By default how many ports are scanned in MAP for a target system
Answer:- 1000
Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a. -F
b. -p-
C. -Pn
d. -sn
e. We cannot disable port scanning.
Answer:- d
Q15. Which of the following options can be used for OS and Version detection?
a. -Sn
b. -Pn
C. -A
d. -ST
e. None of these
Answer:- c
Important Links
Follow us & Join Our Groups for Latest Information Updated by US | |
🔥Follow US On Google News | ✔Click Here |
🔥WhatsApp Group Join Now | ✔Click Here |
🔥Join US On Telegram | ✔Click Here |
🔥Website | ✔Click Here |