NPTEL Ethical Hacking Week 8 Assignment Answers 2023

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Ethical Hacking Week 8 Assignment Solutions

NPTEL Ethical Hacking Assignment Answers 2023

NPTEL Ethical Hacking Week 8 Assignment Answers 2023

1. Consider the following statements:
(1) Steganography refers to a set of methods to hide some secrete information in an audio/image/executable files.
(il) Steganography and digital watermarking shares same operational and functional behaviors.
a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true
d. Both (i) and (ii are false.

Answer :- For Answer Click Here

2. Consider a gray-level image of size 2000 x 2000, where each pixel is stored in 24-bits
(containing red, green, and blue components as 8-bit each. How many bytes of information can
be hidden in the image by using LSB steganography technique? (Assume that only the least
significant bit in each 8-bit color component is modified).

Answer :- For Answer Click Here

3. Which of the following statement(s) is/are true?
a. Biometrics refers to an automated method for hiding information in a media like audio, video, image etc.
b. Biometrics refers to embedding copyright, ownership, license and similar information in a medium such as audio, video, image etc.
с. Biometrics refers to an automated method for recognizing individuals based on measurable biological and behavioral characteristics.
d. None of these.

Answer :- For Answer Click Here

4. Which of the following is/are examples) of behaviour biometric?
a. Retina scan
b. Fingerprint recognition
c. Facial recognition
d. None of these

Answer :- For Answer Click Here

5. Which of the following statements) is/are true in biometric systems?
a. For authentication application, a user template is compared against all possible templates stored in the database.
b. For verification application, a user template is compared against a specific single template stored in the database.
c. Biometric systems can provide 100% accuracy in security applications.
d. None of these.

Answer :- For Answer Click Here

7. Which of the following attacks rely on the accumulation of TCP half-open connections on the server?
a. Ping of death attack.
b. SYN flooding attack.
c. Smurf attack.
d. None of these.

Answer :- For Answer Click Here

8. Which of the following statements) is/are true for HTTP Flood attack?
a. It is a type of Distributed-Denial-of-Service (DDoS) attack.
b. It overwhelms a target server by accumulating large number of TCP half-open connections.
c. It overwhelms a target server using oversized ping packets.
d. It overwhelms a target server with HTTP request.
e. None of these.

Answer :- For Answer Click Here

9. Which of the following approach can be used to mitigate HTTP flood attack?
a. Use captcha test.
b. Use JavaScript computational challenge.
c. Use web application firewall.
d. Block ping requests.
e. Block TCP connections.
f. None of these.

Answer :- For Answer Click Here

10. Which of the following is true for recursive name resolution?
a. A host may have to send multiple DNS requests to several DNS servers.
b. A host sends a single DNS request to its next higher-level DNS server.
c. Name resolution happens recursively within the host itself.
d. All of these.

Answer :- For Answer Click Here
Course NameEthical Hacking
CategoryNPTEL Assignment Answer
Home Click Here
Join Us on TelegramClick Here

Leave a comment