This set of MCQ(multiple choice questions) focuses on the Ethical Hacking NPTEL 2023 Week 1 Assignment Solutions.
Course layout
Answers COMING SOON! Kindly Wait!
Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking NPTEL 2023 Week 1 Assignment Solution” contains 10 questions.
Now, start attempting the quiz.
Ethical Hacking NPTEL 2023 Week 1 Assignment Solutions
Q1. In which of the following penetration testing models, no information about the network is given to tester?
a) White box model
b) Black box model
c) Red box model
d) Gray box model
e) None of these
Answer: b
Q2. Which of the following statement(s) is/are true for a circuit switched network?
a) A communication link can be shared by more than one connection.
b) A communication link is dedicated to a connection and cannot be shared with
other connections.
c) The packet transfer delay between a pair of nodes may depend on the prevailing
network traffic.
d) The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
e) It is efficient for bursty traffic.
Answer: b
Q3. A 1000 byte packet is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose
propagation delay is 10 msec. The packet will reach the destination after _______ msec.
(Assume 1K = 1000)
Answer: 170
Answer:
Q4. Which of the following statement(s) is/are true for virtual circuit based packet transfer approach?
a) It is a connection-oriented approach, where a route is established priori to
transfer of packets.
b) In this approach, each packets follows distinct path.
c) The intermediate node can perform dynamic routing.
d) All the packets reach in order to the destination.
e) It is a true packet switched network.
Answer: a,d,e
Q5. Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?
a) Session layer
b) Transport layer
c) Network layer
d) Datalink layer
e) Physical layer
Answer: b
Q6. Which of the following is/are false for TCP/IP model?
a) It allows cross-platform communications among heterogeneous networks.
b) It is a scalable client-server architecture which allows network modification
without disrupting the current services.
c) It can also represent any other protocol stack other than the TCP/IP suite such as
Bluetooth connection.
d) None of these.
Answer: c
Q7. Which of the following is true for the IP?
a) It uniquely identifies a network interface of a computer system.
b) It uniquely identifies a host in the network.
c) It indicates how many hardware ports are there in the computer system.
d)None of these.
Answer: a
Q8. How many bits are used for IP address (in IP version 4) and port number respectively?
a) 32, 8
b) 32, 16
c) 48, 8
d) 48, 16
Answer: b
Q9. If a 2000 byte data message is sent using a TFTP, the corresponding Ethernet packet will be of _____ size bytes.
Answer: 2050
Answer:
Q10. If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field _____?
Answer: 48
Answer:
Ethical Hacking NPTEL 2022 Week 1 Assignment Solutions
Q1. Which of the following statement(s) is/are true with respect to penetration testing of a network?
a) In the white box model, the tester has complete information about the network.
b) In the black box model, the tester has complete information about the network.
c) In the gray box model, the tester has partial information about the network.
d) In the red box model, the tester does not have any information about the network.
Answer: a), c)
Q2. Which of the following statement(s) is/are true for a packet switched network?
a) A point-to-point communication link may be shared by more than one end-to-end connection.
b) A point-to-point communication link is dedicated to a connection and cannot be shared with other connections.
c) The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
d) The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
Answer: a), d)
Q3. A packet of size 5000 bytes is sent over a 100 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ________ msec. (Assume 1K = 1000)
Answer: 405
Q4. Which of the following OSI layers is responsible for node-to-node routing of packets?
a) Physical layer
b) Transport layer
c) Network layer
d) Datalink layer
Answer: c)
Q5. What is the purpose of the port number in TCP/IP networks?
a) It uniquely identifies a network interface of a computer system.
b) It uniquely identifies a host in the network.
c) It indicates how many hardware ports are there in the computer system.
d) None of these.
Answer: d)
Q6. Which of the following statement(s) is/are true for the TCP protocol?
a) It provides connection-oriented, reliable packet transfer service.
b) It provides connection-less datagram service.
c) All packets from a source to a destination follow the same path.
d) It routes the packets from one node to the next.
Answer: a)
Q7. Which of the following are valid port numbers in TCP/IP?
a) 10,000
b) 50,000
c) 100,000
d) 500,000
e) 750,000
Answer: a), b)
Q8. If the IP header is 256 bits long, what will be the value of the “HLEN” field?
a) 4
b) 5
c) 16
d) 24
e) None of these
Answer: e)
Q9. The maximum size of data that can be accommodated in an IP datagram is ________ bytes.
Answer: 65535
Q10. Which of the following statement(s) is/are true?
a) For small number of packets, datagram is faster than virtual circuits.
b) For large number of packets, datagram is faster than virtual circuits.
c) In datagram, a dedicated communication path is established between two end stations.
d) In datagram, it is not required to establish a connection between two end systems.
Answer: a), d)
<< Prev- Ethical Hacking Week 0 Assignment Solutions
>> Next- Ethical Hacking Week 2 Assignment Solutions
NPTEL answers: Problem solving through programming in C
Programming in Java NPTEL week 1 quiz answers
NPTEL – Python for Data Science assignment solutions
Nptel – Deep Learning assignment solutions
The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error in our site then kindly inform us. Don’t forget to provide the appropriate URL along with error description. So that we can easily correct it.
Thanks in advance.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.