Nptel Week 8 Ethical Hacking Assignment Answers
a. Hiding some text information within an image file.
b. Hiding some text information within an audio clip.
C. Hiding some secret information within an executable file.
d. Encrypting an image file so that only the intended recipient can view it.
Answer :
Options : A and B
2)Which of the following statements correctly represents the term steganography?
a. Encrypting some information such that it will not be legible to an unauthorized person.
b. A low cost alternative to encryption and decryption.
c. Secure way of communicating without sharing any key.
d. None of these.
Answer:
Option: D
3)Which of the following correspond to behavioral biometrics ?
a. Biometrics that relate to human behavior.
b. Biometrics that relate to human body.
C. Biometrics that rely on the use of a powerful computer system.
d. None of these
Answer :
Option : D
4)Consider a gray-level image of size 1000 x 1000, where each pixel is stored in 8-bits
(representing a gray scale). How many bits of information can be hidden in the image by using
LSB steganography technique? Assume 1K = 1000, and 1M = 1,000,000.
a. 100Kbits
b. 500kbits
c. 1 Mbits
d. None of these.
Answer :
Option : C
5) What is denial-of-service attack?
a. An attack on a system whereby stored files get modified or deleted.
b. An attack that destroys users information from a system.
c. An attack that destroys the stored password information in a system.
d. None of these.
Answer :
Option : D
6)Which of the following attacks refer to the situation where an attacker gains entry into the
victim machine (or spoofs the IP address) and then sends a ping request to a broadcast
address?
a. SYN flooding attack.
b. Smurf denial-of-service attack.
C. DNS Spoofing attack.
d. None of these
Answer :
Option : B
7)Which of the following attacks rely on some vulnerability in the TCP connection establishment
phase?
a. SYN flooding attack.
b. DNS spoofing attack.
C.Smurf DoS attack.
d. None of these.
Answer :
Option : A
8)Which of the following is/are true for Botnet?
a. A Botnet refers to a host connected to the Internet that is under control of the
attacker
b. A Botnet host runs a number of bots that are repetitive code segments with some
malicious intent.
c. It relies on IP spoofing to mount attacks.
d. All of these.
Answer :
Option : A
9)Which of the following is true for iterative name resolution?
a. A host may have to send multiple DNS requests to several DNS servers.
b. A host sends a single DNS request to its next higher-level DNS server.
c. Name resolution happens iteratively within the host itself without sending any
DNS request messages.
d. None of these.
Answer :
Option : A
10) What is the full form of PGP?
a. Packet Group Protocol
b. Port Group Protocol
c. Pretty Good Privacy
d. All of these.
Answer :
Option : C
Note:
The answers given in the website not 100% correct.
0 Comments