NPTEL Ethical Hacking Assignment 9 Answers 2022

NPTEL Ethical Hacking Assignment 9

Are you looking for the Answers to NPTEL Ethical Hacking Assignment 9? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Ethical Hacking Assignment 9

What is Ethical Hacking?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for NPTEL Ethical Hacking Assignment 9

Assignment No.Answers
Ethical Hacking Assignment 1 Click Here
Ethical Hacking Assignment 2 Click Here
Ethical Hacking Assignment 3 Click Here
Ethical Hacking Assignment 4 Click Here
Ethical Hacking Assignment 5 Click Here
Ethical Hacking Assignment 6 Click Here
Ethical Hacking Assignment 7 Click Here
Ethical Hacking Assignment 8 Click Here
Ethical Hacking Assignment 9 Click Here
Ethical Hacking Assignment 10 Click Here

NPTEL Ethical Hacking Assignment 9 Answers:-

Q1. Why do packet sniffers require the network interface card (NIC) to be put in promiscuous mode?

a. So that broadcast packets can be sent to the victim machine. 
b. So that all packets crossing the NIC can be read. 
c. So that headers of encrypted packets can be deciphered. 
d. None of these.

Answer:- b. So that all packets crossing the NIC can be read. 

Q2. Which of the following measures can prevent packet sniffing on a network segment?

  • a. Restrict physical access to the network by unauthorized persons. 
  • b. Install the latest version of TCP protocol that does not contain vulnerabilities. 
  • c. Use encryption to protect confidential information. 
  • d. All of these.

Answer: d. All of these.

Q3. How can NMAP detect whether network sniffing is probably going on in a network?

  • a. By sending a NMAP ping request to all the machines on the network. 
  • b. By conducting TCP stealth scan on all the machines in the network. 
  • c. By using a script that checks whether any of the machines has the network card configured in the promiscuous mode. 
  • d. None of these.

Answer: c. By using a script that checks whether any of the machines has the network card configured in the promiscuous mode. 

Q4. Which of the following features are present in Ettercap?

  • a. IP-based and MAC-based filtering. 
  • b. Character injection. 
  • c. Packet filtering and dropping. 
  • d. SQL injection. e. All of these.

Answer: a, b, c

Q5. Which of the following can be used for computer-based social engineering attack?

  • a. Tailgating. 
  • b. Sending out chain letter emails. 
  • c. An illegitimate email falsely claiming to be from a legitimate site. 
  • d. Reverse social engineering.

Answer: a, b, c

Q6. Which of the following tools can be used to put the NIC in promiscuous mode?

  • a. macchanger 
  • b. dnsenum 
  • c. slowloris 
  • d. arpspoof

Answer:- d. arpspoof

Q7. Which of the following protocols are vulnerable to sniffing attack?

  • a. HTTP 
  • b. FTP 
  • c. HTTPS 
  • d. SSL

Answer: a, b

Q8. How does Slowloris work?

  • a. It sends a single large packet to victim system. 
  • b. It sends multiple HTTP requests to the victim system but never completes the request. 
  • c. It mounts MAC attack on target system. 
  • d. It turns on NIC of the system in promiscuous mode.

Answer:

Q9. Which of the following is/are example(s) of bandwidth flood?

  • a. ICMP flood 
  • b. SYN flood 
  • c. MAC Flood

Answer: a, b

Q10. For mounting DoS attack using hping3 tool what option can be used as an alternative of –i u10000?

  • a. –count 
  • b. –fast 
  • c. –faster 
  • d. –flood

Answer:

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at [email protected]

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.

NPTEL Ethical Hacking Assignment 9 Answers 2022:- All the Answers provided here to help the students as a reference, You must submit your assignment at your own knowledge.