Ethical Hacking | NPTEL 2023 | Week 5 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions.

Course layout

Answers COMING SOON! Kindly Wait!

Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers

NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking NPTEL 2023 Week 5 Assignment Solution” contains 15 questions.

Now, start attempting the quiz.

Ethical Hacking NPTEL 2023 Week 5 Assignment Solutions

Q1. Which of the following tools can be used for scanning vulnerabilities?

a) Hypervisor
b) Nessus
c) Hydra
d) Nmap
e) Crunch

Answer: b), d)

Q2. NMAP scripts can be used for:

a) Vulnerability scanning
b) Backdoor detection
c) Port detection
d) Password attack
e) None of these

Answer: a), b), c)

Q3. Which of the following NMAP scripts is used to identify the OS of a target system?

a) smb-os-brute
b) smb-os-discovery
c) http-os-check
d) None of these

Answer: b)

Q4. Which of the following scripts can be used to detect if a target system is vulnerable to DoS attack?

a) http-methos
b) http-brute
c) http-dos-check
d) http-slowloris-check
e) ftp-anon

Answer: d)

Q5. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?

a) ssh 10.0.0.1 -p pwd
b) ssh 10.0.0.1 -l pwd -p user
c) ssh 10.0.0.1 user pwd
d) None of these

Answer: d)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q6. The necessary parameters required to generate word list using crunch tool is:

a) Minimum length of the word list.
b) Maximum length of the word list.
c) File name where the word list will be stored.
d) No parameters are required to generate a word list.

Answer: a), b), c)

Q7. Which of the following tools can be used to perform password attack?

a) Hydra
b) Archive.org
c) Netcraft
d) Whois
e) None of these

Answer: a)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q8. Which of the following can be used for gaining higher privileges than existing one?

a) Vertical privilege escalation
b) Horizontal privilege escalation
c) Diagonal privilege escalation
d) Triangular privilege escalation
e) None of these

Answer: a)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q9. Which of the following approaches can be used to extract information about all users in a target system?

a) Use of nmap script smb-enum-user
b) Hydra tool
c) Crunch tool
d) Enum4linux

Answer: a), d)

Q10. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?

a) Client
b) Server

Answer: b)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q11. To upload any file in the target system which is connected through FTP connection which of the following command can be used?

a) put
b) get
c) upload
d) download

Answer: a)

Q12. Which of the following can self-replicate itself?

a) Trojan
b) Virus
c) Ransomware
d) All of these

Answer: b)

Q13. How a malware can get inside into a system?

a) Removable devices
b) Attachments
c) Fake Programs
d) Untrusted sites and freeware software

Answer: a), b), c), d)

Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing/ARP poisoning.

a) True
b) False

Answer: a)

Q15. Which of the following commands is used to see all arp entries in a system?

a) arp -a
b) arp -s
c) arp -i
d) arp -d

Answer: a)

Ethical Hacking NPTEL week 5 Assignment Solutions

Ethical Hacking NPTEL 2022 Week 5 Assignment Solutions

Q1. Which of the following may be used for password cracking?

a) Dictionary attack.
b) Social engineering attack.
c) TCP SYN attack.
d) DoS attack.

Answer: a), b)

Q2. Which of the following can be performed using the NMAP tool?

a) Identify open ports on a target system.
b) Identify the operating system that is running on a target system.
c) Identify the hosts available in a network.
d) Vulnerability available on a target system.

Answer: a), b), c), d)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q3. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?

a) nmap — script=script_name.nse
b) nmap — script script_name.nse
c) nmap — script script_name
d) nmap script_name.nse

Answer: a), b), c)

Q4. Which of the following http scripts can be used to detect if a target system is running a webserver?

a) http-methos
b) http-brute
c) http-slowloris-check
d) ftp-anon

Answer: a)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q5. Which of the following approaches can be used to create a secure hacking environment?

a) Use of proxy tools/servers
b) Using kali Linux in a live mode
c) Use of MAC changer tool
d) Use of firewalls

Answer: a), c)

Ethical Hacking NPTEL week 5 Assignment Solutions

Q6. Which of the following ports should be open on the target system to run a nmap script http-malware-host?

a) http
b) ssh
c) telnet
d) Dose not require any services to be running

Answer: a)

Q7. Which of the following protocol(s) is/are not vulnerable to sniffing?

a) HTTP
b) Telnet
c) POP
d) HTTPS
e) SMTP

Answer: d)

<< Prev- Ethical Hacking Week 4 Assignment Solutions

>> Next- Ethical Hacking Week 6 Assignment Solutions


DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

NPTEL answers: Problem solving through programming in C

Programming in Java NPTEL week 1 quiz answers

NPTEL – Python for Data Science assignment solutions

Nptel – Deep Learning assignment solution

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *