Are you looking for the Answers to NPTEL Ethical Hacking Assignment 1? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ Ethical Hacking Assignment 1 “
What is Ethical Hacking?
Ethical Hacking is a fun-filled course where Domain Certification helps learners to gain expertise in a specific Area/Domain. TEthical hacking is a subject that has become very important in a present-day context and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security, and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them. There will be hands-on demonstrations that will be helpful to the participants. The participants are encouraged to try and replicate the demonstration experiments that will be discussed as part of the course.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Below you can find the answers for Ethical Hacking Assignment 1
|Ethical Hacking Assignment 1||Click Here|
|Ethical Hacking Assignment 2||Click Here|
|Ethical Hacking Assignment 3||Click Here|
|Ethical Hacking Assignment 4||Click Here|
|Ethical Hacking Assignment 5||Click Here|
|Ethical Hacking Assignment 6||Click Here|
|Ethical Hacking Assignment 7||Click Here|
|Ethical Hacking Assignment 8||Click Here|
Ethical Hacking Assignment 1 Answers:-
Q1. Which of the following statement(s) is/are true with respect to penetration testing of a network?
Answer:- a. In the white box model, the tester has complete information about the network,
c. In the gray box model, the tester has partial information about the network.
Q2. Which of the following statement(s) is/are true for a packet switched network?
Answer:- A. A point-to-point communication link may be shared by more than one end-to-end connection.
C. The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
D. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
Q3. A packet of size 5000 bytes is sent over a 100 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 5 msec. The packet will reach the destination after ________ msec. (Assume 1K = 1000)
Q4. Which of the following OSI layers is responsible for node-to-node routing of packets?
Answer:- d. Datalink layer
???? Next Week Answers: Assignment 02 ????
Q5. What is the purpose of the port number in TCP/IP networks?
Answer:- D. None of these.
Q6. Which of the following statement(s) is/are true for the TCP protocol?
Answer:- A. It provides connection-oriented, reliable packet transfer service. D. It routes the packets from one node to the next.
Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.
Q7. Which of the following are valid port numbers in TCP/IP?
Answer:- A. 10,000 B. 50,000
Q8. If the IP header is 256 bits long, what will be the value of the “HLEN” field?
Answer:- E. None of these
Q9. The maximum size of data that can be accommodated in an IP datagram is ________ bytes.
Answer:- Correct Answer: 65535
Q10. Which of the following statement(s) is/are true?
Answer:- A. For small number of packets, datagram is faster than virtual circuits.
D. In datagram, it is not required to establish a connection between two end systems.
NPTEL Ethical Hacking Assignment 2
For other courses answers:- Visit
For Internship and job updates:- Visit