Ethical Hacking | NPTEL 2023 | Week 1 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Ethical Hacking NPTEL 2023 Week 1 Assignment Solutions.

Course layout

Answers COMING SOON! Kindly Wait!

Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers

NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking NPTEL 2023 Week 1 Assignment Solution” contains 10 questions.

Now, start attempting the quiz.

Ethical Hacking NPTEL 2023 Week 1 Assignment Solutions

Q1. In which of the following penetration testing models, no information about the network is given to tester?

a) White box model
b) Black box model
c) Red box model
d) Gray box model
e) None of these

Answer: b

Q2. Which of the following statement(s) is/are true for a circuit switched network?

a) A communication link can be shared by more than one connection.
b) A communication link is dedicated to a connection and cannot be shared with
other connections.
c) The packet transfer delay between a pair of nodes may depend on the prevailing
network traffic.
d) The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
e) It is efficient for bursty traffic.

Answer: b

Q3. A 1000 byte packet is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose
propagation delay is 10 msec. The packet will reach the destination after _______ msec.
(Assume 1K = 1000)

Answer: 170

Answer:

Q4. Which of the following statement(s) is/are true for virtual circuit based packet transfer approach?

a) It is a connection-oriented approach, where a route is established priori to
transfer of packets.
b) In this approach, each packets follows distinct path.
c) The intermediate node can perform dynamic routing.
d) All the packets reach in order to the destination.
e) It is a true packet switched network.

Answer: a,d,e

Q5. Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?

a) Session layer
b) Transport layer
c) Network layer
d) Datalink layer
e) Physical layer

Answer: b

Ethical Hacking NPTEL week 1 Assignment Solutions

Q6. Which of the following is/are false for TCP/IP model?

a) It allows cross-platform communications among heterogeneous networks.
b) It is a scalable client-server architecture which allows network modification
without disrupting the current services.
c) It can also represent any other protocol stack other than the TCP/IP suite such as
Bluetooth connection.
d) None of these.

Answer: c

Q7. Which of the following is true for the IP?

a) It uniquely identifies a network interface of a computer system.
b) It uniquely identifies a host in the network.
c) It indicates how many hardware ports are there in the computer system.
d)None of these.

Answer: a

Ethical Hacking NPTEL week 1 Assignment Solutions

Q8. How many bits are used for IP address (in IP version 4) and port number respectively?

a) 32, 8
b) 32, 16
c) 48, 8
d) 48, 16

Answer: b

Ethical Hacking NPTEL week 1 Assignment Solutions

Q9. If a 2000 byte data message is sent using a TFTP, the corresponding Ethernet packet will be of _____ size bytes.

Answer: 2050

Answer:

Q10. If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field _____?

Answer: 48

Answer:

Ethical Hacking NPTEL week 1 Assignment Solutions

Ethical Hacking NPTEL 2022 Week 1 Assignment Solutions

Q1. Which of the following statement(s) is/are true with respect to penetration testing of a network?

a) In the white box model, the tester has complete information about the network.
b) In the black box model, the tester has complete information about the network.
c) In the gray box model, the tester has partial information about the network.
d) In the red box model, the tester does not have any information about the network.

Answer: a), c)

Q2. Which of the following statement(s) is/are true for a packet switched network?

a) A point-to-point communication link may be shared by more than one end-to-end connection.
b) A point-to-point communication link is dedicated to a connection and cannot be shared with other connections.
c) The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
d) The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.

Answer: a), d)

Q3. A packet of size 5000 bytes is sent over a 100 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ________ msec. (Assume 1K = 1000)

Answer: 405

Q4. Which of the following OSI layers is responsible for node-to-node routing of packets?

a) Physical layer
b) Transport layer
c) Network layer
d) Datalink layer

Answer: c)

Q5. What is the purpose of the port number in TCP/IP networks?

a) It uniquely identifies a network interface of a computer system.
b) It uniquely identifies a host in the network.
c) It indicates how many hardware ports are there in the computer system.
d) None of these.

Answer: d)

Ethical Hacking NPTEL week 1 Assignment Solutions

Q6. Which of the following statement(s) is/are true for the TCP protocol?

a) It provides connection-oriented, reliable packet transfer service.
b) It provides connection-less datagram service.
c) All packets from a source to a destination follow the same path.
d) It routes the packets from one node to the next.

Answer: a)

Q7. Which of the following are valid port numbers in TCP/IP?

a) 10,000
b) 50,000
c) 100,000
d) 500,000
e) 750,000

Answer: a), b)

Ethical Hacking NPTEL week 1 Assignment Solutions

Q8. If the IP header is 256 bits long, what will be the value of the “HLEN” field?

a) 4
b) 5
c) 16
d) 24
e) None of these

Answer: e)

Ethical Hacking NPTEL week 1 Assignment Solutions

Q9. The maximum size of data that can be accommodated in an IP datagram is ________ bytes.

Answer: 65535

Q10. Which of the following statement(s) is/are true?

a) For small number of packets, datagram is faster than virtual circuits.
b) For large number of packets, datagram is faster than virtual circuits.
c) In datagram, a dedicated communication path is established between two end stations.
d) In datagram, it is not required to establish a connection between two end systems.

Answer: a), d)

Ethical Hacking NPTEL week 1 Assignment Solutions

<< Prev- Ethical Hacking Week 0 Assignment Solutions

>> Next- Ethical Hacking Week 2 Assignment Solutions


NPTEL answers: Problem solving through programming in C

Programming in Java NPTEL week 1 quiz answers

NPTEL – Python for Data Science assignment solutions

Nptel – Deep Learning assignment solutions

The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error in our site then kindly inform us. Don’t forget to provide the appropriate URL along with error description. So that we can easily correct it.

Thanks in advance.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *