NPTEL Ethical Hacking Week 5 Assignment Answers 2023

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Ethical Hacking Week 5 Assignment Answers 2023

NPTEL Ethical Hacking Assignment Answers 2023

NPTEL Ethical Hacking Week 5 Assignment Answers 2023

1. Which of the following tools can be used for scanning vulnerabilities?
a. Hypervisor
b. Nessus
c. Hydra
d. Nmap
e. Crunch

Answer:- b, d

2. NMAP scripts can be used for:
a. Vulnerability scanning
b. Backdoor detection.
c. Port detection.
d. Password attack.
e. None of these.

Answer:- For Answer Click Here

3. Which of the following MAP scripts is used to identify the OS of a target system?
a. smb-os-brute
b. smb-os-discovery
c. http-os-check
d. None of these.

Answer:- For Answer Click Here

4. Which of the following scripts can be used to detect if a target system is vulnerable to Dos
attack?
a. http-methos
b. http-brute
c. http-dos-ckeck
d. http-slowloris-check
e. ftp-anon

Answer:- For Answer Click Here

5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a. ssh 10.0.0.1 -p pwd
b. ssh 10.0.0.1 -I pwd -p user
c. ssh 10.0.0.1 user pwd
d. None of these

Answer:- 

6. The necessary parameters required to generate word list using crunch tool is:
a. Minimum length of the word list.
b. Maximum length of the word list.
c. File name where the word list will be stored.
d. No parameters are required to generate a word list.

Answer:- For Answer Click Here

7. Which of the following tools can be used to perform password attack?
a. Hydra
b. Archive.org
c. Netcraft
d. Whois
e. None of these.

Answer:- 

8. Which of the following can be used for gaining higher privileges than existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. Triangular privilege escalation.
e. None of these.

Answer:- For Answer Click Here

9. Which of the following approaches can be used to extract information about all users in a target system?
a. Use of map script smb-enum-user
b. Hydra tool
c. Crunch tool
d. Enum4linux

Answer:- 

10. In an attack using the remote administrative tool, which part of the tool needs to be placed in
target system?
a. Client
b. Server

Answer:- For Answer Click Here

11. To upload any file in the target system which is connected through FT connection which of the following command can be used?
a. put
b. get
c. upload
d. download

Answer:- 

12. Which of the following can self-replicate itself?
a. Trojan
b. Virus
c. Ransomware
d. All of these

Answer:- 

13. How a malware can get inside into a system?
a. Removable devices
b. Attachments
c. Fake Programs
d. Untrusted sites and freeware software.

Answer:- 

14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
a. True
b. False

Answer:- 

15. Which of the following commands is used to see all arp entries in a system?
a. arp -a
b. arp-s
c. arp-i
d. arp-d

Answer:- 

Important Links

Follow us & Join Our Groups for Latest Information
Updated by US
🔥Follow US On Google NewsClick Here
🔥WhatsApp Group Join NowClick Here
🔥Join US On TelegramClick Here
🔥WebsiteClick Here

Leave a comment