Ethical Hacking | Week 8

Ethical Hacking Week 8 Assignment Answers

Course Link: https://onlinecourses.nptel.ac.in/noc23_cs44/course

Q1. Which of the following are examples of steganography?
a. Hiding some text information within an image file.
b. Hiding some text information within an audio clip.

c. Hiding some secret information within an executable file.
d. Encrypting an image file so that only the intended recipient can view it.

Q2. Which of the following statements correctly represents the term steganography?
a. Encrypting some information such that it will not be legible to an unauthorized person.
b. A low-cost alternative to encryption and decryption.
c. Secure way of communicating without sharing any key.
d. None of these.

Q3. Which of the following correspond to behavioral biometrics?
a. Biometrics that relate to human behavior.
b. Biometrics that relate to human body.
c. Biometrics that rely on the use of a powerful computer system.
d. None of these

Q4. Consider a gray-level image of size 1000 x 1000, where each pixel is stored in 8-bits (representing a gray scale). How many bits of information can be hidden in the image by using LSB steganography technique? Assume 1K = 1000, and 1M = 1,000,000.
a. 100 Kbits
b. 500 Kbits
c. 1Mbits
d. None of these.

Q5. What is denial-of-service attack?
a. An attack on a system whereby stored files get modified or deleted.
b. An attack that destroys users information from a system.
c. An attack that destroys the stored password information in a system.
d. None of these.

Q6. Which of the following attacks refer to the situation where an attacker gains entry into the victim machine (or spoofs the IP address) and then sends a ping request to a broadcast address?
a. SYN flooding attack.
b. Smurf denial-of-service attack.
c. DNS spoofing attack.
d. None of these.

Q7. Which of the following attacks rely on some vulnerability in the TCP connection establishment phase?
a. SYN flooding attack.
b. DNS spoofing attack.
c. Smurf DoS attack.
d. None of these.

Q8. Which of the following is/are true for Botnet?
a. A Botnet refers to a host connected to the Internet that is under control of the attacker.
b. A Botnet host runs a number of bots that are repetitive code segments with some malicious intent.
c. Itrelies on IP spoofing to mount attacks.
d. All of these.

Q9. Which of the following is true for iterative name resolution?
a. A host may have to send multiple DNS requests to several DNS servers.
b. A host sends a single DNS request to its next higher-level DNS server.
c. Name resolution happens iteratively within the host itself without sending any DNS request messages.
d. None of these.

Q10. What is the full form of PGP?
a. Packet Group Protocol
b. Port Group Protocol
c. Pretty Good Privacy
d. All of these.


* The material and content uploaded on this website are for general information and reference purposes only and don’t copy the answers of this website to any other domain without any permission or else copyright abuse will be in action.

Please do it by your own first!

DMCA.com Protection Status

0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments



0
Would love your thoughts, please comment.x
()
x