0% found this document useful (0 votes)
74 views5 pages

Assignment 9 Solution

this document is about the ethical hacking

Uploaded by

saraswathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views5 pages

Assignment 9 Solution

this document is about the ethical hacking

Uploaded by

saraswathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

NPTEL Online Certification Courses

Indian Institute of Technology Kharagpur

Course Name: ETHICAL HACKING


Assignment Solution- Week 9
TYPE OF QUESTION: MCQ/MSQ/SA
Number of questions: 10 Total mark: 10 x 1 = 10
______________________________________________________________________________

QUESTION 1:
Which mode allows a network interface card (NIC) to capture all traffic on the network segment
regardless of the destination?
a. Monitor mode
b. Transparent mode
c. Promiscuous mode
d. Hypervisor mode

Correct Answer: c

Detail Solution: When using sniffing tools like Wireshark, the NIC is set to promiscuous mode,
allowing it to capture all packets on the segment, not just those destined for the host.
The correct option is (c).
______________________________________________________________________________

QUESTION 2:
Which of the following is/are not a feature of Wireshark?
a. Captures and analyzes packets
b. Generates statistical reports
c. Manipulates live network traffic
d. Carries out SQL injection attack

Correct Answer: c, d

Detail Solution: Wireshark can capture, analyze, and display packets with GUI support, and also
generate statistical reports. But it cannot manipulate live traffic — tools like Ettercap or
BurpSuite are used for that, SQL injection is not a feature of Wireshark.
The correct options are (c) and (d).
______________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION 3:
Which of the following protocols are vulnerable to sniffing attack?
a. HTTP
b. FTP
c. HTTPS
d. SSL

Correct Answer: a, b

Detail Solution: HTTPS and SSL exchange data in secure channel. HTTP and FTP protocol
exchange data in plain text (unsecured form), and thus they are vulnerable to sniffing attack.
The correct options are (a) and (b).
_____________________________________________________________________________

QUESTION 4:
Which of the following countermeasures is effective against sniffing attacks?
a. Use switch instead of hub
b. Use Telnet instead of SSH
c. Disable HTTPS
d. Allow ARP broadcasts

Correct Answer: a

Detail Solution: A switch forwards packets only to intended recipients, limiting the scope for
sniffing. Using telnet and disabling HTTPS can increase the risk of sniffing.
The correct option is (a).
______________________________________________________________________________

QUESTION 5:
Which of the following features are present in Ettercap?
a. IP-based and MAC-based filtering
b. Character injection
c. Packet filtering and dropping
d. SQL injection

Correct Answer: a, b, c
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

Detail Solution: The Ettercap tool can carry out IP-based filtering, MAC-based filtering, and
character injection in a packet, packet filtering & dropping. However, it cannot be used to
mount SQL injection attacks.
The correct options are (a), (b) and (c).
____________________________________________________________________________

QUESTION 6:
Which of the following is an example of reverse social engineering?

a. Attacker pretends to be IT support so victim voluntarily provides information


b. Attacker steals password by shoulder surfing
c. Attacker sends phishing mail
d. Attacker sneaks in through tailgating

Correct Answer: a

Detail Solution: In reverse social engineering, the attacker acts as an authority, and the victim
approaches the attacker for help, revealing sensitive info.
The correct option is (a).
____________________________________________________________________________

QUESTION 7:
Which of the following is NOT a human-based social engineering attack?

a. Impersonation
b. Shoulder surfing
c. Piggybacking
d. Phishing

Correct Answer: d

Detail Solution: Phishing is a computer-based social engineering attack. The others are example
of direct human-based attacks.
The correct option is (d).
____________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

QUESTION 8:
A DoS attack that exploits the TCP three-way handshake is called:

a. SYN Flooding
b. ICMP Flood
c. Ping of Death
d. UDP Flood

Correct Answer: a

Detail Solution: SYN Flooding sends repeated SYN requests without completing handshakes,
exhausting server listen queues.
The correct option is (a).
____________________________________________________________________________

QUESTION 9:
Which tool performs a DoS attack by sending partial HTTP requests and never completing
them?

a. Hydra
b. Wireshark
c. Slowloris
d. Crunch

Correct Answer: c

Detail Solution: Slowloris opens many connections with partial requests, keeping them alive
and exhausting server resources.
The correct option is (c).
____________________________________________________________________________

QUESTION 10:
Which of the following best defines a Botnet?
a. A network of legitimate IoT devices
b. A protocol for DoS mitigation
c. A security feature in switches
d. A group of compromised systems remotely controlled by an attacker
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

Correct Answer: d

Detail Solution: A botnet is a large network of compromised machines under attacker control,
often used to launch DDoS attacks.
The correct option is (d).
______________________________________________________________________________

************END*******

You might also like