This set of MCQ(multiple choice questions) focuses on the Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions.
Course layout
Answers COMING SOON! Kindly Wait!
Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking NPTEL 2023 Week 5 Assignment Solution” contains 15 questions.
Now, start attempting the quiz.
Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions
Q1. Which of the following tools can be used for scanning vulnerabilities?
a) Hypervisor
b) Nessus
c) Hydra
d) Nmap
e) Crunch
Answer: b), d)
Q2. NMAP scripts can be used for:
a) Vulnerability scanning
b) Backdoor detection
c) Port detection
d) Password attack
e) None of these
Answer: a), b), c)
Q3. Which of the following NMAP scripts is used to identify the OS of a target system?
a) smb-os-brute
b) smb-os-discovery
c) http-os-check
d) None of these
Answer: b)
Q4. Which of the following scripts can be used to detect if a target system is vulnerable to DoS attack?
a) http-methos
b) http-brute
c) http-dos-check
d) http-slowloris-check
e) ftp-anon
Answer: d)
Q5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
a) ssh 10.0.0.1 -p pwd
b) ssh 10.0.0.1 -l pwd -p user
c) ssh 10.0.0.1 user pwd
d) None of these
Answer: d)
Q6. The necessary parameters required to generate word list using crunch tool is:
a) Minimum length of the word list.
b) Maximum length of the word list.
c) File name where the word list will be stored.
d) No parameters are required to generate a word list.
Answer: a), b), c)
Q7. Which of the following tools can be used to perform password attack?
a) Hydra
b) Archive.org
c) Netcraft
d) Whois
e) None of these
Answer: a)
Q8. Which of the following can be used for gaining higher privileges than existing one?
a) Vertical privilege escalation
b) Horizontal privilege escalation
c) Diagonal privilege escalation
d) Triangular privilege escalation
e) None of these
Answer: a)
Q9. Which of the following approaches can be used to extract information about all users in a target system?
a) Use of nmap script smb-enum-user
b) Hydra tool
c) Crunch tool
d) Enum4linux
Answer: a), d)
Q10. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?
a) Client
b) Server
Answer: b)
Q11. To upload any file in the target system which is connected through FTP connection which of the following command can be used?
a) put
b) get
c) upload
d) download
Answer: a)
Q12. Which of the following can self-replicate itself?
a) Trojan
b) Virus
c) Ransomware
d) All of these
Answer: b)
Q13. How a malware can get inside into a system?
a) Removable devices
b) Attachments
c) Fake Programs
d) Untrusted sites and freeware software
Answer: a), b), c), d)
Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing/ARP poisoning.
a) True
b) False
Answer: a)
Q15. Which of the following commands is used to see all arp entries in a system?
a) arp -a
b) arp -s
c) arp -i
d) arp -d
Answer: a)
Ethical Hacking NPTEL 2022 Week 5 Assignment Solutions
Q1. Which of the following may be used for password cracking?
a) Dictionary attack.
b) Social engineering attack.
c) TCP SYN attack.
d) DoS attack.
Answer: a), b)
Q2. Which of the following can be performed using the NMAP tool?
a) Identify open ports on a target system.
b) Identify the operating system that is running on a target system.
c) Identify the hosts available in a network.
d) Vulnerability available on a target system.
Answer: a), b), c), d)
Q3. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?
a) nmap — script=script_name.nse
b) nmap — script script_name.nse
c) nmap — script script_name
d) nmap script_name.nse
Answer: a), b), c)
Q4. Which of the following http scripts can be used to detect if a target system is running a webserver?
a) http-methos
b) http-brute
c) http-slowloris-check
d) ftp-anon
Answer: a)
Q5. Which of the following approaches can be used to create a secure hacking environment?
a) Use of proxy tools/servers
b) Using kali Linux in a live mode
c) Use of MAC changer tool
d) Use of firewalls
Answer: a), c)
Q6. Which of the following ports should be open on the target system to run a nmap script http-malware-host?
a) http
b) ssh
c) telnet
d) Dose not require any services to be running
Answer: a)
Q7. Which of the following protocol(s) is/are not vulnerable to sniffing?
a) HTTP
b) Telnet
c) POP
d) HTTPS
e) SMTP
Answer: d)
<< Prev- Ethical Hacking Week 4 Assignment Solutions
>> Next- Ethical Hacking Week 6 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
NPTEL answers: Problem solving through programming in C
Programming in Java NPTEL week 1 quiz answers
NPTEL – Python for Data Science assignment solutions
Nptel – Deep Learning assignment solution
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.