NPTEL Ethical Hacking Week 5 Assignment Answers 2023

NPTEL Ethical Hacking Week 5 Assignment Answers 2023
1. Which of the following tools can be used for scanning vulnerabilities?
a. Hypervisor
b. Nessus
c. Hydra
d. Nmap
e. Crunch
Answer:- b, d
2. NMAP scripts can be used for:
a. Vulnerability scanning
b. Backdoor detection.
c. Port detection.
d. Password attack.
e. None of these.
Answer:- For Answer Click Here
3. Which of the following MAP scripts is used to identify the OS of a target system?
a. smb-os-brute
b. smb-os-discovery
c. http-os-check
d. None of these.
Answer:- For Answer Click Here
4. Which of the following scripts can be used to detect if a target system is vulnerable to Dos
attack?
a. http-methos
b. http-brute
c. http-dos-ckeck
d. http-slowloris-check
e. ftp-anon
Answer:- For Answer Click Here
5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a. ssh 10.0.0.1 -p pwd
b. ssh 10.0.0.1 -I pwd -p user
c. ssh 10.0.0.1 user pwd
d. None of these
Answer:-
6. The necessary parameters required to generate word list using crunch tool is:
a. Minimum length of the word list.
b. Maximum length of the word list.
c. File name where the word list will be stored.
d. No parameters are required to generate a word list.
Answer:- For Answer Click Here
7. Which of the following tools can be used to perform password attack?
a. Hydra
b. Archive.org
c. Netcraft
d. Whois
e. None of these.
Answer:-
8. Which of the following can be used for gaining higher privileges than existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. Triangular privilege escalation.
e. None of these.
Answer:- For Answer Click Here
9. Which of the following approaches can be used to extract information about all users in a target system?
a. Use of map script smb-enum-user
b. Hydra tool
c. Crunch tool
d. Enum4linux
Answer:-
10. In an attack using the remote administrative tool, which part of the tool needs to be placed in
target system?
a. Client
b. Server
Answer:- For Answer Click Here
11. To upload any file in the target system which is connected through FT connection which of the following command can be used?
a. put
b. get
c. upload
d. download
Answer:-
12. Which of the following can self-replicate itself?
a. Trojan
b. Virus
c. Ransomware
d. All of these
Answer:-
13. How a malware can get inside into a system?
a. Removable devices
b. Attachments
c. Fake Programs
d. Untrusted sites and freeware software.
Answer:-
14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
a. True
b. False
Answer:-
15. Which of the following commands is used to see all arp entries in a system?
a. arp -a
b. arp-s
c. arp-i
d. arp-d
Answer:-
Important Links
Follow us & Join Our Groups for Latest Information Updated by US | |
🔥Follow US On Google News | ✔Click Here |
🔥WhatsApp Group Join Now | ✔Click Here |
🔥Join US On Telegram | ✔Click Here |
🔥Website | ✔Click Here |