NPTEL Ethical Hacking Assignment 10 Answers 2023

Hello NPTEL Learners, In this article, you will find NPTEL Ethical Hacking Assignment 10 Answers 2023. All the Answers are provided below to help the students as a reference don’t straight away look for the solutions, first try to solve the questions by yourself. If you find any difficulty, then look for the solutions.

NPTEL Ethical Hacking Assignment 11 Answers 2023 Join GroupūüĎá
NPTEL Principles of Management Assignment 1 Answers 2023

Note: We are trying to give our best so please share with your friends also.

NPTEL Ethical Hacking Assignment 10 Answers 2023
NPTEL Ethical Hacking Assignment 10 Answers 2023

NPTEL Ethical Hacking Assignment 10 Answers 2023:

We are updating answers soon Join Group for update: CLICK HERE

Q.1. Which of the following is/are true for black box testing kind of attack?

  • a. It is an invasive type of attack.
  • b. It is a non-invasive type of attack.
  • c. The attacker has information about the implementation details.
  • d. It relies on weakness of implementation

Q.2. What are the typical countermeasures to prevent hardware-based attacks?

  • a. We obfuscate data in registers and buses.
  • b. We add preventive measures against side-channel attacks.
  • c. We provide authentication using physical uncionable functions.
  • d. We use a very secure cryptographic algorithm.

Q.3. Which of the following statement(s) is/are true for side channel attacks?

  • a. They exploit some weakness in the algorithm.
  • b. They exploit some weakness in the implementation of the algorithm.
  • c. They require physical access to the device.
  • d. They only require the set of inputs/outputs to the algorithm.
NPTEL Ethical Hacking Assignment 10 Answers Join GroupūüĎá
NPTEL Ethical Hacking Assignment 10 Answers 2023

Q.4. Which of the following side channel(s) is/are typically exploited in side-channel attacks?

  • a. Electromagnetic emissions.
  • b. Time taken to execute an algorithm.
  • c. The time and space complexities of an algorithm.
  • d. Power consumed during computation.
  • e. All of these.

Q.5. For modular exponentiation computation of x17, how many squaring and multiplication operations would be required?

  • a. 4 and 4.
  • b. 4 and 2.
  • c. 3 and 2.
  • d. 3 and 1.
  • e. None of these.

Q.6. What does power analysis do?

  • a. It measures variation in power consumption during a computation.
  • b. It attacks the power supply and feeds power to the circuit.
  • c. It relies on the use of a hardware Trojan in the circuit.
  • d. All of these.

Q.7. Which of the following strategies can help to prevent power analysis attacks?

  • a. The computation times in the different branches of conditional statements must be unequal.
  • b. The computation times in the different branches of conditional statements must
  • be the same.
  • c. We can use a random noise generator in the circuit.
  • d. We obfuscate the scan chains in the circuit.
NPTEL Ethical Hacking Week 10 Assignment 10 Answers Join GroupūüĎá

Q.8. What is the meaning of PUF?

  • a. Perfect Universal Function
  • b. Physically Unclonable Function
  • C. Polynomially Unclonable Function
  • d. None of these.

Q.9. Which of the following is/are true for hardware Trojan?

  • a. It incurs small hardware overhead.
  • b. It is stealthy and usually difficult to detect.
  • c. It relies on a number of malicious nodes to mount attacks.
  • d. It is used to reduce power consumption.

Q.10. What are some of the software-based countermeasures to prevent timing-based side-channel attack?

  • a. Use a structured programming language for implementation.
  • b. Mask the data representation.
  • c. Introduce redundant computations as required.
  • d. All of these.
NPTEL Ethical Hacking Assignment 10 Answers Join GroupūüĎá
NPTEL Ethical Hacking Assignment 10 Answers 2023

Disclaimer: This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by Chase2learn. This tutorial is only for Discussion and Learning purpose.

About NPTEL Ethical Hacking Course:

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them.

Course Layout:

  • Week 1:¬†¬†¬†Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
  • Week 2:¬† ¬†IP addressing and routing. TCP and UDP. IP subnets.
  • Week 3:¬†¬†¬†Routing protocols. IP version 6.
  • Week-4:¬† ¬†Installation of attacker and victim system. Information gathering using advanced google search,, netcraft, whois, host, dig, dnsenum and NMAP tool.
  • Week-5:¬† Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment System Hacking: password cracking, privilege escalation, application execution. Malware and Virus. ARP spoofing and MAC attack.
  • Week 6:¬† ¬†Introduction to cryptography, private-key encryption, public-key encryption.
  • Week 7:¬† ¬†Cryptographic hash functions, digital signature and certificate, applications.
  • Week 8:¬† ¬†Steganography, biometric authentication, network-based attacks, DNS and Email security.
  • Week-9:¬† ¬†Packet sniffing using wireshark and burpsuite, password attack using burp suite. Social engineering attacks and Denial of service attacks.
  • Week 10:¬†Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.
  • Week-11:¬†Different types of attacks using Metasploit framework: password cracking, privilege escalation, remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site scripting.
  • Week 12:¬†Case studies: various attacks scenarios and their remedies.

Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

If you have not registered for exam kindly register Through

Join Our Telegram Group:- CLICK HERE

Sharing Is Caring