Are you looking for the Answers to NPTEL Ethical Hacking Assignment 7? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Ethical Hacking Assignment 7“
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Below you can find the answers for NPTEL Ethical Hacking Assignment 7
|Ethical Hacking Assignment 1||Click Here|
|Ethical Hacking Assignment 2||Click Here|
|Ethical Hacking Assignment 3||Click Here|
|Ethical Hacking Assignment 4||Click Here|
|Ethical Hacking Assignment 5||Click Here|
|Ethical Hacking Assignment 6||Click Here|
|Ethical Hacking Assignment 7||Click Here|
|Ethical Hacking Assignment 8||Click Here|
|Ethical Hacking Assignment 9||Click Here|
|Ethical Hacking Assignment 10||Click Here|
NPTEL Ethical Hacking Assignment 7 Answers:-
Q1. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:
H1 = HASH (M1)
H2 = HASH (M2)
When do we say there is a collision?
Q2. What do you mean by first preimage resistance in the context of hash functions?
Q3. What kind of mapping does a hash function implement?
Q4. Which of the following is/are not hash functions?
Next Week Assignment Answers
Q5. Which of the following algorithms are the slowest and the fastest?
Q6. What are the block size of DES algorithm and the hash digest size of MD5 algorithm?
Q7. On which cryptographic algorithm can the birthday attack be mounted?
If there are any changes in answers will notify you on telegram so you can get a 100% score, So Join
Q8. What kinds of algorithms are typically used in the computation of digital signature?
Q9. The SSL record protocol is responsible for
Q10. Which of the following security protocols work above the IP layer in the TCP/IP protocol stack?
For other courses answers:- Visit
For Internship and job updates:- Visit
Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.
if you have any suggestions then comment below or contact us at admin@prajyotjigmail-com
If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.