NPTEL Ethical Hacking Assignment 4 Answers 2022

NPTEL Ethical Hacking Assignment 4

Are you looking for the Answers to NPTEL Ethical Hacking Assignment 4? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Ethical Hacking Assignment 4

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for NPTEL Ethical Hacking Assignment 4

Assignment No.Answers
Ethical Hacking Assignment 1 Click Here
Ethical Hacking Assignment 2 Click Here
Ethical Hacking Assignment 3 Click Here
Ethical Hacking Assignment 4 Click Here
Ethical Hacking Assignment 5 Click Here
Ethical Hacking Assignment 6 Click Here
Ethical Hacking Assignment 7 Click Here
Ethical Hacking Assignment 8 Click Here

NPTEL Ethical Hacking Assignment 4 Answers:-

Q1. What is the purpose of the Hypervisor software?

Answer:- c

Q2. What are some of the features in Kali Linux?

Answer:- b

Q3. Which of the following statement(s) is/are true about passive reconnaissance?

Answer:- a,c

Q4. Which of the following can be used for passive reconnaissance?

Answer:- a), b), c), d)

???? Next Week Answers: Assignment 04 ????

quizxp telegram

Q5. How host discovery can be carried out using ICMP sweep?

Answer:- a

Q6. How does port scanning using TCP Connect works?

Answer:- b

Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.

quizxp telegram

Q7. The establishment of a TCP connection involves a negotiation called 3-way handshake. What type of message the client sends to the server in order to begin this negotiation?

Answer:- d

Q8. Which of the following statement(s) is/are true for default networking mode of Oracle Virtual Box?

Answer:- a,c

Q9. Which of the following can be used to retrieve the deleted data and all pages available with any website?

Answer:- b

Q10. Which of the following search operators can narrow down the search results to a specific website?

Answer:- d

Q11. What is the purpose of the following NMAP command?
nmap –sn 192.55.70.110-120

Answer:- b

Q12. In port scanning using TCP SYN scan, how are the open and closed ports identified?

Answer:- a,b

Q13. By default how many ports are scanned in nmap for a target system ………….?

Answer:- 1000

Q14. Which of the following options can be used for OS and Version detection?

Answer:- c

Q15. Which of the following nmap options can be used to carry out UDP scan?

Answer:- c

Q16. For port scanning using stealth scan (-sS), NMAP first identifies if the system is up or not by sending TCP SYN, TCP ACK, and ICMP type-8 packet to target system. Which of the following option can be used along with –sS option to directly start port scanning?

Answer:- b

Q17. Which of the following NMAP scanning options will scan less number of ports as compared to default scanning?

Answer:- a,b,c

Q18. Let us say port numbers 80 and 443 are open for a target system. Then there is high probability that the target is hosting a website?

Answer:- a

Q19. Can the use of firewall prevent port/host scanning?

Answer:- a

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at admin@prajyotjigmail-com

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.