NPTEL Ethical Hacking Assignment 6 Answers 2023

Hello NPTEL Learners, In this article, you will find NPTEL Ethical Hacking Assignment 6 Week 6 Answers 2023. All the Answers are provided below to help the students as a reference don’t straight away look for the solutions, first try to solve the questions by yourself. If you find any difficulty, then look for the solutions.

NPTEL Ethical Hacking Assignment 6 Answers 2023 Join Group👇
NPTEL Principles of Management Assignment 1 Answers 2023

Note: We are trying to give our best so please share with your friends also.

NPTEL Ethical Hacking Assignment 6 Answers 2023
NPTEL Ethical Hacking Assignment 6 Answers 2023

NPTEL Ethical Hacking Assignment 6 Answers 2023:

We are updating answers soon Join Group for update: CLICK HERE

Q.1. Which of the following statement is true for Masquerade attack?

  • a. In this attack, an attacker passively captures a transaction and its reply.
  • b. In this attack, some portion of message is altered on its way.
  • c. In this attack, an attacker prevents access of resource to its legitimate users.
  • d. In this attack, the attacker pretends as a legitimate entity.
  • e. In this attack, the attacker analyzes the network traffic.

Q.2. Which of the following statement(s) is/are true?

  • a. In private key encryption, separate keys are used by sender and receiver.
  • b. In private key encryption, a single key is used by sender and receiver.
  • c. In public key encryption, separate keys are used by sender and receiver.
  • d. In public key encryption, a single key is used by sender and receiver.

Q.3. Consider the following statement:

(i) In symmetric key cryptography, the security on secrecy of the key.

(ii) In symmetric key cryptography, the security depends on encryption/decryption algorithm.

  • a. Only (i) is true
  • b. Only (ii) is true
  • c. Both (i) and (ii) are true.
  • d. Both (i) and (ii) are false.
NPTEL Ethical Hacking Assignment 7 Answers Join Group👇
NPTEL Ethical Hacking Assignment 6 Answers 2023

Q.4. 25 parties want to exchange messages securely. The number of distinct key required by a symmetric key encryption algorithm and public key encryption technique like RSA will be _ and __ respectively.

  • a. 25 and 50
  • b. 50 and 50
  • c. 100 and 50
  • d. 300 and 25
  • e. 300 and 50

Q.5. How will be the plaintext for the cipher text “LETTY CEIV” encrypted using a substitution cipher approach, where each letter is replaced by the k-th next letter. (Assumption: (i) the alphabets are wrapped around, i.e. Z is followed by A, (ii) each alphabets (A to Z) is assigned a number (1 to 26), (iii) the value of secrete key k is 4).

  • a. HAPPY YEAR
  • b. HAPPU YAER
  • C. HAPPY YEAR
  • d. None of this

Q.6. In data encryption standard (DES), longer plain text are processed in _ bit blocks.

  • Answer: 64

Q.7. The effective key lengths used in AES encryption algorithms can be:

  • a. 64 bit
  • b. 128 bit
  • c. 192 bit
  • d. 256 bit
  • e. 512 bit
NPTEL Ethical Hacking Week 6 Assignment 6 Answers Join Group👇
CLICK HERE

Q.8. For decryption using public-key cryptography _ is used.

  • a. Receiver’s public key
  • b. Receiver’s private key
  • C. Sender’s public key
  • d. Sender’s private key

Q.9. Which of the following statement(s) is/are true.

  • a. The security of RSA algorithm is dependent on prime factorization problem.
  • b. RSA algorithm is vulnerable to man-in-the middle attack.
  • c. Diffie-Hellman approach can be used for encryption/decryption of message.
  • d. Symmetric encryption approaches are faster than asymmetric encryption.
  • e. None of these.

Q.10. Which of the following techniques cannot be used for message authentication?

  • a. Conventional encryption approach such as private key.
  • b. MD4
  • C. SHA-256
  • d. SHA-0
  • e. RIPEMD-128.
NPTEL Ethical Hacking Assignment 6 Answers Join Group👇
NPTEL Ethical Hacking Assignment 6 Answers 2023

Disclaimer: This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by Chase2learn. This tutorial is only for Discussion and Learning purpose.

About NPTEL Ethical Hacking Course:

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them.

Course Layout:

  • Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
  • Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
  • Week 3:   Routing protocols. IP version 6.
  • Week-4:   Installation of attacker and victim system. Information gathering using advanced google search, archive.org, netcraft, whois, host, dig, dnsenum and NMAP tool.
  • Week-5:  Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment System Hacking: password cracking, privilege escalation, application execution. Malware and Virus. ARP spoofing and MAC attack.
  • Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
  • Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
  • Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email security.
  • Week-9:   Packet sniffing using wireshark and burpsuite, password attack using burp suite. Social engineering attacks and Denial of service attacks.
  • Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.
  • Week-11: Different types of attacks using Metasploit framework: password cracking, privilege escalation, remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site scripting.
  • Week 12: Case studies: various attacks scenarios and their remedies.
CRITERIA TO GET A CERTIFICATE:

Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

If you have not registered for exam kindly register Through https://examform.nptel.ac.in/

Join Our Telegram Group:- CLICK HERE

Sharing Is Caring