Ethical Hacking | NPTEL | Week 8 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Ethical Hacking Week 8 Solutions.

Course layout

Answers COMING SOON! Kindly Wait!

Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers

NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking Week 8 Solutions” contains 10 questions.

Now, start attempting the quiz.

Ethical Hacking week 8 Solutions

Q1. Consider the following statements:
(i) Steganography refers to a set of methods to hide some secrete information in an audio/image/exectable files.
(ii) Steganography and digital watermarking shares same operational and functional behaviors.

a) Only (i) is true
b) Only (ii) is true
c) Both (i) and (ii) are true
d) Both (i) and (ii) are false

Answer: c) Both (i) and (ii) are true

Q2. Consider a gray-level image of size 2000 x 2000, where each pixel is stored in 24-bits (cotaining red, green, and blue components as 8-bit each. How many bytes of information can be hidden in the image by suing LSB steganography technique? (Assume that only the least significant bit in each 8-bit color component is modified).

Answer: 1500000

Ethical Hacking week 8 SolutionsEthical Hacking week 8 solutions

Q3. Which of the following statement(s) is/are true?

a) Biometrics refers to an automated method for hiding information in a media like audio, video, image etc.
b) Biometrics refers to embedding copyright, ownership, license and similar information in a medium such as audio, video, image etc.
c) Biometrics refers to an automated method for recognizing individuals based on measurable biological and behavioral characteristics.
d) None of these

Answer: c)

Q4. Which of the following is/are example(s) of behaviour biometric?

a) Retina scan
b) Fingerprint recognition
c) Facial recognition
d) None of these

Answer: d) None of these

Q5. Which of the following statement(s) is/are true in biometric systems?

a) For authentication application, a user template is compared against all possible templates stored in the database.
b) For verification application, a user template is compared against a specific single template stored in the database.
c) Biometric systems can provide 100% accuracy in security applications.
d) None of these

Answer: d) None of these

Ethical Hacking week 8 Solutions

Q6. Which of the following attacks rely on the accumulation of TCP half-open connections on the server?

a) Ping of death attack
b) SYN flooding attack
c) Smurf attack
d) None of these

Answer: b) SYN flooding attack

Q7. In which of the following denial-of-service attacks, the attacker attempts to crash/freeze target computer/service by sending oversized packet in simple ping command?

a) SYN flooding attack
b) Smurf attack
c) Ping-of-death
d) None of these

Answer: c) Ping-of-death

Ethical Hacking week 8 Solutions

Q8. Which of the following statement(s) is/are true for HTTP Flood attack?

a) It is a type of Distributed-Denial-of-Service (DDoS) attack.
b) It overwhelms a target server by accumulating large number of TCP half-open connections.
c) It overwhelms a target server using oversized ping packets.
d) It overwhelms a target server with HTTP request.
e) None of these

Answer: a), d)

Ethical Hacking week 8 Solutions

Q9. Which of the following approach can be used to mitigate HTTP flood attack?

a) Use captcha test
b) Use JavaScript computational challenge
c) Use web application firewall
d) Block ping requests
e) Block TCP connections
f) None of these

Answer: a), b), c)

Q10. Which of the following is true for recursive name resolution?

a) A host may have to send multiple DNS requests to several DNS servers.
b) A host sends a single DNS request to its next higher-level DNS server.
c) Name resolution happens recursively within the host itself.
d) All of these

Answer: b) A host sends a single DNS request to its next higher-level DNS server.

Ethical Hacking week 8 Solutions

<< Prev- Ethical Hacking Week 7 Assignment Solutions

>> Next- Ethical Hacking Week 9 Assignment Solutions


DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *