NPTEL Ethical Hacking Assignment 6 Answers 2022

NPTEL Ethical Hacking Assignment 6

Are you looking for the Answers to NPTEL Ethical Hacking Assignment 6? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Ethical Hacking Assignment 65

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for NPTEL Ethical Hacking Assignment 6

Assignment No.Answers
Ethical Hacking Assignment 1 Click Here
Ethical Hacking Assignment 2 Click Here
Ethical Hacking Assignment 3 Click Here
Ethical Hacking Assignment 4 Click Here
Ethical Hacking Assignment 5 Click Here
Ethical Hacking Assignment 6 Click Here
Ethical Hacking Assignment 7 Click Here
Ethical Hacking Assignment 8 Click Here
Ethical Hacking Assignment 9 Click Here
Ethical Hacking Assignment 10 Click Here

NPTEL Ethical Hacking Assignment 6 Answers:-

Q1. 15 parties want to exchange messages securely using a symmetric key encryption algorithm. The number of distinct key values required will be:

a. 30
b. 225
c. 210
d. 105

Answer:- d

Q2. 200 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be __________

Answer: 400

Q3. What are the effective key lengths used in DES and triple-DES symmetric key encryption algorithms in bits?

a. 56 and 168
b. 56 and 112
c. 56 and 56
d. 64 and 128
e. None of these

Answer: a

Q4. On which difficult mathematical problem does the security of RSA algorithm depend on?

a. Discrete logarithm problem.
b. Testing whether a given number if prime or not.
c. Prime factorization problem.
d. The RSA threshold detection.
e. All of these.

Answer: c

Q5. Which of the following types of attack can the DoS attack be categorized into?

a. Interruption
b. Interception
c. Modification
d. Fabrication

Answer: a

Q6. Which of the following terms concern verifying the identity of the sender?

a. Encryption.
b. Authentication.
c. Decryption.
d. None of these.

Answer:-  b

Q7. Consider a mono-alphabetic cipher with the following key value:
(A B C D I J K L E F G H M N O P U V W X Q R S T Y Z)
What will be the encrypted form of the message “W I N D O W” ?

a. W E N D H W
b. S K N G H S
c. S E N D O S
d. None of these.

Answer: c

Q8. How many AES rounds are required for 128-bit key size?

a. 10
b. 11
c. 12
d. 14

Answer: a

Q9. For encryption using public-key cryptography, we use the

a. Receiver’s public key
b. Receiver’s private key
c. Sender’s public key
d. Sender’s private key

Answer: a

Q10. Which of the following techniques is/are vulnerable to man-in-the-middle attack?

a. AES
b. RSA
c. Diffie-Hellman key exchange
d. None of these.

Answer:-  c

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at admin@prajyotjigmail-com

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.