This set of MCQ(multiple choice questions) focuses on the Ethical Hacking NPTEL 2023 Week 4 Assignment Solutions.
Course layout
Answers COMING SOON! Kindly Wait!
Week 1:Â Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking NPTEL 2023 Week 4 Assignment Solution” contains 15 questions.
Now, start attempting the quiz.
Ethical Hacking NPTEL 2023 Week 4 Assignment Solutions
Q1. Which of the following statement(s) is/are true for NAT networking mode?
a) In NAT mode, the virtual machines cannot access each other
b) NAT mode does not allow access of internet to the installed virtual machines.
c) In NAT mode, the hypervisor allocate same IP address to all virtual machine.
d) All of these.
Answer: c)
Q2. Which of the following statement(s) is/are true about “Passive Reconnaissance”?
a) Information about the target is collected indirectly.
b) Information about the target is collected directly.
c) There is a chance of detection.
d) There is no chance of dectection.
Answer: a), d)
Q3. Which of the following can be used for active reconnaissance.
a) Whois
b) Archive.org
c) NMAP
d) Nessus
e) Metasploit
f) Hydra
Answer: c), d), e)
Q4. Which of the following information cannot be retrieved using active reconnaissance?
a) Live host in a network.
b) Open ports
c) Services running in the systems
d) Operating system of the target system
e) Vulnerabilities of target machine/application
f) None of these
Answer: f)
Q5. Which of the following tools cannot be used for DNS enumeration?
a) host
b) dnsenum
c) dig
d) None of these
Answer: b)
Q6. What is the main objective of host discovery?
a) Identification of live hosts.
b) Identification of services running in the target system.
c) Identification of version of the services running in the target system.
d) Identification of the operating system of the target systems.
e) Identification of open ports.
Answer: a)
Q7. Which of the following options is used to trace the details of the sent/received packets?
a) –packet-trace
b) –reason
c) –disable-arp-ping
d) None of these
Answer: a)
Q8. Which of the following options can be used to perform ICMP ECHO sweep?
a) -PE
b) -PP
c) -PM
d) -PU
Answer: a)
Q9. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a) RST
b) ACK
c) SYN-ACK
d) SYN
Answer: d)
Q10. How does port scanning using TCP connect works?
a) It creates a half-open connection during TCP connection establishment, and decides whether the port is open or not.
b) It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
c) It does not use 3-way handshake.
d) None of these.
Answer: b)
Q11. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a) An attacker sends a SYN packet to a port, if it receives an SYN-ACK(SA) then the port is reported as open.
b) An attacker sends a SYN packet to a port, if it receives an RST(RA) then the port is reported as closed.
c) An attacker sends a ACK packet to a port, if it receives an RST then the port is reported as open.
d) An attacker sends a ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer: a), b)
Q12. Can the use of firewall prevent port/host scanning?
a) True
b) False
Answer: a)
Q13. By default how many ports are scanned in NMAP for a target system ____________?
Answer: 1000
Q14. If we does not want to carry out port scanning then which of the following options can be used with NMAP?
a) -F
b) -p-
c) -Pn
d) -sn
e) We cannot disable port scanning.
Answer: e)
Q15. Which of the following options can be used for OS and Version detection?
a) –sn
b) -Pn
c) -A
d) –sT
e) None of these
Answer: c)
Ethical Hacking NPTEL 2023 Week 4 Assignment Solutions
Q1. Which of the following statement(s) is/are false?
a. Hypervisor allows one host system to support multiple virtual machines by sharing the resources.
b. Hypervisor allows one host system to support multiple virtual machines; however, it
does not allow resource sharing.
c. Kali-linux is a Debian-based Linux distribution that has collection of tools that are useful for penetration testing
d. Kali-linux is a hack-proof secured operating system.
e. None of these.
Answer: e)
Q2. Which of the following statement(s) is/are true about “Active Reconnaissance”?
a. Information about the target is collected indirecthly.
b. Information about the target is collected directly.
c. There is a chance of detection in active reconnaissance.
d. There is no chance of detection in active reconnaissance.
Answer: b),c)
Q3. Which of the following is not an information source over the internet for an attackers?
a. Whois
b. YouTube
c. Archive.org
d. Netcraft
e. Hydra
Answer: e)
Q4. Which of the following data cannot be retrieved about the target system/website using Whois database lookup?
a. Registration details.
b. Name servers.
c. IP address.
d. History of the website.
e. None of these.
Answer: e)
Q5. Which of the following search operators can narrow down the search results to a site that has the targeted search term in the URL?
a. inurl
b. intitle
c. site
d. exclude
e. double quote (*”)
f. filetype
Answer: a)
Q6. Which of the following information can be retrieved using DNS/Mail server enumeration?
a. Usernames
b. Computer names
C.Operating system
d. Open ports
e. IP address of system
f. Size of the network
Answer: a),b),c),d),e)
Q7. Which of the following statement(s) is/are true for host discovery using ICMP ECHO and ICMP non-ECHO sweep?
a. In ICMP sweep, the attacker sends out an ICMP ECHO request packet to the target, and
waits for an ICMP ECHO reply response.
b. In Non-Echo ICMP sweep, the attacker sends out an ICMP ECHO request packet to the
target, and waits for an ICMP ECHO reply response.
c. In ICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is
considered as down.
d. In ICMP sweep, if the attacker does not receive an ICMP ECHO reply then the host is
considered as live.
e. In Non-Echo ICMP sweep, if the attacker dose not receive an ICMP ECHO reply then the host is considered as down.
Answer: a),b),c),d),e)
Q8. Which of the following option(s) is/are used for host discovery using TCP and UDP sweep respectively?
a. PE, PP
b. PE, PM
c. PS, PA
d. PS, PU
e. PA, PU
Answer: c)
Q9. Which of the following information is retrieved by port scanning?
a. Information about the operating system running on the target system.
b. The services running on the target system.
c. The IP address of the target system.
d. None of these.
Answer: b)
Q10. What kind of packet is received if the target port is closed/filtered in TCP connect/SYN scan?
a. RST
b. ACK
c. SYN-ACK
d. SYN
e. RST/ACK
Answer: e)
Q11. Which of the following option(s) is/are used for OS and Version detection respectively?
a. sn, PE
b. Pn, SP
c. O,-sV
d. sT, PP
e. None of these.
Answer: c)
Q12. How many ports are scanned in NMAP for a target system if we use -F option ______?
Answer: 1000
Q13. Which of the following NMAP scanning option(s) is/are correct with respect to port scanning?
a. -F
b. -p20
c. p20-100
d. -p20::100
e. p20, 22, 28, 80
f. All of these.
Answer: a
Q14. If we want to disable host discovery in port scanning, then which of the following options can be used?
a. -F
b. -P
C.-Pn
d. -Sn
e. We cannot disable host discovery.
Answer: c)
Q15. Which of the following can be used to reconnaissance countermeasures?
a. Do not release critical info in public.
b. Encrypt password and sensitive information.
C. Restrict zone transfer.
d. Examine logs periodically.
e. Use firewalls.
f. All of these.
Answer: c)
Ethical Hacking NPTEL 2022 Week 4 Assignment Solutions
Q1. What is the purpose of the Hypervisor software?
a) It is a secure software layer that is difficult to hack.
b) It opens a terminal window through which commands can be given directly.
c) It can create and run multiple virtual machines on a computer system.
d) None of these.
Answer: c)
Q2. What are some of the features in Kali Linux?
a) It is a secure operating system that has been designed as hack-proof.
b) It is a Debian-based Linux distribution that have collection of tools that are useful for penetration testing.
c) It is a software distribution created by the company Kali Inc.
d) None of these.
Answer: b)
Q3. Which of the following statement(s) is/are true about passive reconnaissance?
a) Information about the target is collected indirectly.
b) Information about the target is collected directly.
c) There is no direct communication with the target system.
d) There is direct communication with the target system
Answer: a), c)
Q4. Which of the following can be used for passive reconnaissance?
a) Whois
b) archive.org
c) Netcraft
d) Search engines
Answer: a), b), c), d)
Q5. How host discovery can be carried out using ICMP sweep?
a) The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO reply response.
b) It uses ICMP protocol to broadcast packets to all the machines in a network.
c) It utilizes the vulnerability of TCT connection establishment.
d) None of these.
Answer: a)
Q6. How does port scanning using TCP Connect works?
a) It creates a half-open connection during TCP connection establishment, and decides whether the port is open.
b) It completes the 3-way handshake in TCP connection establishment, and decides whether the port is open.
c) It drops TCP packets as they arrive from the target.
d) None of these.
Answer: b)
Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?
a) RST
b) ACK
c) SYN-ACK
d) SYN
Answer: d)
Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?
a) It allocates unique IP addresses to all operating systems.
b) It allocates a virtual IP address to all operating systems.
c) It allocates IP address of the HOST system to all operating systems.
d) In this mode an operating system can access internet
e) None of these
Answer: a), c)
Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?
a) Whois
b) archive.org
c) Netcraft
d) Search engines
Answer: b)
Q10. Which of the following search operators can narrow down the search results to a specific website?
a) inurl
b) OR
c) AND
d) site
e) filetype
Answer: d)
Q11. What is the purpose of the following NMAP command?
nmap –sn 192.55.70.110-120
a) A trace sweep
b) A ping scan
c) A port scan
d) None of these
Answer: b)
Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?
a) An attacker sends a SYN packet to a port, if it receives an SYN-ACK (SA) then the port is reported as open.
b) An attacker sends a SYN packet to a port, if it receives an RST (RA) then the port is reported as closed.
c) An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as open.
d) An attacker sends an ACK packet to a port, if it receives an RST then the port is reported as closed.
Answer: a), b)
Q13. By default how many ports are scanned in nmap for a target system ………….?
Answer: 1000
Q14. Which of the following options can be used for OS and Version detection?
a) –sn
b) -Pn
c) -A
d) -sT
e) None of these
Answer: c)
Q15. Which of the following nmap options can be used to carry out UDP scan?
a) -sP
b) -sS
c) -sU
d) None of these
Answer: c)
Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?
a) -sn
b) -p
c) -Pn
d) None of these
Answer: b)
Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?
a) -F
b) -pb20-100
c) -p22, 23, 80, 8080
d) None of these
Answer: a), b), c)
Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?
a) True
b) False
Answer: a)
Q19. Can the use of firewall prevent port/host scanning?
a) True
b) False
Answer: a)
<< Prev- Ethical Hacking Week 3 Assignment Solutions
>> Next- Ethical Hacking Week 5 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
NPTEL answers: Problem solving through programming in C
Programming in Java NPTEL week 1 quiz answers
NPTEL – Python for Data Science assignment solutions
Nptel – Deep Learning assignment solution
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.