Are you looking for the Answers to NPTEL Ethical Hacking Assignment 5? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Ethical Hacking Assignment 5“
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Below you can find the answers for NPTEL Ethical Hacking Assignment 5
|Ethical Hacking Assignment 1||Click Here|
|Ethical Hacking Assignment 2||Click Here|
|Ethical Hacking Assignment 3||Click Here|
|Ethical Hacking Assignment 4||Click Here|
|Ethical Hacking Assignment 5||Click Here|
|Ethical Hacking Assignment 6||Click Here|
|Ethical Hacking Assignment 7||Click Here|
|Ethical Hacking Assignment 8||Click Here|
NPTEL Ethical Hacking Assignment 5 Answers:-
Q1. Which of the following tools can be used for scanning vulnerabilities?
Q2. Which of the following may be used for password cracking?
Q3. Which of the following can be used for gaining higher privileges than existing one?
Q4. Which of the following can self-replicate itself?
???? Next Week Answers: Assignment 06 ????
Q5. Which of the following can be performed using the NMAP tool?
Q6. Which of the following NMAP commands are valid to run a nmap script “script_name.nse”?
Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.
Q7. Which of the following http scripts can be used to detect if a target system is running a webserver?
Q8. Which of the following approaches can be used to create a secure hacking environment?
Answer:- For Answer Click Me
Q9. Assume that we want to connect to a target system (10.0.0.1) through ssh service, the username and password are “user” and “pwd” respectively. Which of the following commands can be used to create a ssh connection?
Answer:- For Answer Click Me
Q10. Which of the following approaches can be used to enumerate all user available in a target system?
Q11.Which of the following ports should be open on the target system to run a nmap script http-malware-host?
Q12. In an attack using the remote administrative tool, which part of the tool needs to be placed in target system?
Q13. Which of the following protocol(s) is/are not vulnerable to sniffing?
Q14. The major loophole of ARP is that “a host can send unlimited number of ARP requests”, and this can be used for ARP spoofing / ARP poisoning.
Q15. Which of the following commands is used to see arp table in a system?
For other courses answers:- Visit
For Internship and job updates:- Visit
Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.
if you have any suggestions then comment below or contact us at [email protected]
If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.