You are on page 1of 5

NPTEL » Ethical Hacking

Week 01: Assignment 01


Question 1 ->

a
b
c
d

Answer ->An ethical hacker is a cybersecurity professional who is hired by an


organization to identify and fix vulnerabilities in their computer systems,
networks, and applications. Ethical hackers use the same methods as malicious
hackers, but with the goal of improving the security of the organization they work
for rather than causing harm
The correct option for the question “Which of the following point(s) is/are true for
an ethical hacker?” is
d. None of these points
1 point

Question 2 ->

a
b
c
d

Answer -> d. None of these.

1 point

Question 3->

a
b
c
d
Answer-> b. A communication link is dedicated to a connection and cannot be shared with other
connections.
1 point

Question 4->

a
b
c
d
Answer-> a. It is a connection-less packet switching approach, where no route is established prior to
transfer of packets.
b. In this approach, each packet is transmitted as an independent entity.
c. In this approach each intermediate node can perform dynamic routing.

1 point

Question 5->

a
b
c
d
e

Answer-> c. It uniquely identifies a running application on a specific host in the network.


1 point

Question 6->

a
b
c
d
e

Answer-> e. 80800.

1 point

Question 7->

a
b
c
d

Answer-> a. Map IP addresses to hardware (MAC) addresses.


1 point

Question 8->

a
b
c
d

Answer-> c. TCP provides connectionless, unreliable delivery systems for packets.

Question 9->

Answer-> The HLEN field in the IP header is a 4-bit field that indicates the length of the IP header in
32-bit words. The minimum value for the HLEN field is 5, which corresponds to a header length of
20 bytes. Therefore, if the IP header is 96 bits long, then the value of the HLEN field would be 12
(96/32).

The value of the HLEN field would be 12.

1 point

Question 10->

Answer-> The maximum size of data that can be accommodated in an IP datagram is 65535 bytes

You might also like