Ethical Hacking Answers
Ethical Hacking Answers
ASSIGNMENT 1
In which of the following penetration testing models, no information about the network is given
to the tester?
a. White box model.
b. Black box model.
c. Gray box model.
d. Red box model.
Correct Answer: b
Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link may be shared by more than connection.
b. A communication link is dedicated to a connection and cannot be shared with other
connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network
traffic.
d. It is more efficient for bursty traffic.
Correct Answer: b
Which of the following statement(s) is/are false for virtual circuit based packet transfer
approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of
packets.
b. The intermediate node can perform dynamic routing.
c. All the packets reach in order to the destination.
d. It is a true packet switched network.
Correct Answer: b, d
A packet of size 2000 bytes is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link
whose propagation delay is 5 msec. The packet will reach the destination after ________ msec.
(Assume 1K = 1000)
Correct Answer: 323 to 327
Which of the following OSI layers is responsible for end-to-end reliable data transfer?
a. Physical layer
b. Transport layer
c. Network layer
d. Datalink layer
Correct Answer: b
How many bits are used for IP address (in IPv4) and port number respectively?
a. 32, 8
b. 32, 16
c. 128, 8
d. 128, 16
Correct Answer: b
If the IP header is 224 bits long, what will be the value of the “HLEN” field (in decimal) ______?
Correct Answer: 7
Correct Answer: b, e
For reassembling the fragmented packets at the final destination, which of the following header
field(s) is(are) used by IP?
a. Fragment offset.
b. Flags.
c. Header checksum.
d. HLEN.
e. Identification.
Correct Answer: a, b, e
An IP packet arrives at the final destination with the D flag set as 1. Which of the following
statement is true about the packet?
a. The packet has not been fragmented.
b. The packet has been fragmented and it is the first fragment.
c. The packet has been fragmented and it is the last fragment.
d. None of these.
Correct Answer: a
In an IP packet, the value of HLEN is 8, and the total size of IP packet is 1500 bytes. The number
of data bytes in the packet will be ________.
Correct Answer: 1466 to 1470
Which address classes do the IP addresses 10.16.75.12 and 192.10.85.120 belong to?
a. Class A and Class B
b. Class B and Class C
c. Class C and Class D
d. Class A and Class C
Correct Answer: d
Correct Answer: a, d, f
Which of the following statement(s) is/are false for flag bits in TCP header?
a. SYN=1 and ACK=0 represents a connection request message.
b. SYN=1 and ACK=1 represents a connection confirmation message.
c. RST bit is used to reset/reject connection request.
d. None of these.
Correct Answer: d
What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is
255.255.242.0?
a. 144.16.32.0
b. 144.16.34.0
c. 144.16.34.255
d. 144.16.242.255
Correct Answer: b
An organization is allotted an address block with beginning address as: 144.16.192.24/29 in CIDR
notation. What will be the address range for that block?
a. 144.16.192.0 to 144.16.192.8
b. 144.16.192.8 to 144.16.192.16
c. 144.16.192.16 to 144.16.192.24
d. 144.16.192.24 to 144.16.192.31
Correct Answer: d
ASSIGNMENT 3
Which of the following statement(s) is/are false.
a. IP protocol uses connection-oriented routing.
b. IP protocol uses connection-less routing.
c. In connection-less routing, each packet is treated as an independent packet.
d. None of these.
Correct Answer: a
Which of the following is/are false for direct and indirect packet delivery option?
a. Direct delivery occurs when the destination host and deliverer are present on same network.
b. Indirect delivery occurs when the destination host and deliverer are not present on same
network.
c. In direct delivery, hosts of same network can exchange packets without interference of
router.
d. In an indirect delivery, the packet goes from router to router until it reaches the one
connected to the same physical network as its final destination.
e. None of these.
Correct Answer: e
Correct Answer: b, c, d
Which of the following routing flags can indicate route to a single host (and not to a network) in
the routing table?
a. U
b. G
c. H
d. D
e. M
Correct Answer: c
Which of the following statement (s) is/are false for default route?
a. It is used when no specific address for next hop is available.
b. It is specified by an address 0.0.0.0.
c. It is specified by an address 127.0.0.1.
d. None of these.
Correct Answer: c
Which of the following statement(s) is/are true for Routing Information Protocol (RIP)?
a. RIP is an example of interior routing protocol.
b. RIP maintains timers to detect failed links.
c. RIP suffers from counting to infinity problem.
d. RIP allows faster convergence for larger network.
e. None of these.
Correct Answer: a, b , c
In Open Shortest Path First (OSPF) routing approach, which of the following packets is used to
check if the neighbor router is up or not?
a. Link State Request.
b. Link Request Update.
c. Link State Acknowledgement.
d. TCP 3-way handshake.
e. None of these.
Correct Answer: e
Correct Answer: a, b
If a packet is to be delivered to all the host in a network, what kind of address should be used to
specify the destination?
a. Unicast address.
b. Broadcast address.
c. Anycast address.
d. None of these.
Correct Answer: b
ASSIGNMENT 4
Correct Answer: a, c
Correct Answer: b, c
Which of the following information cannot be retrieved using Whois database lookup?
a. Registration details
b. Name Servers.
c. IP Address
d. History of the website.
e. None of these.
Correct Answer: d
Correct Answer: b
Which of the following statement(s) is/are true for host discovery using ICMP ECHO sweep?
a. For ICMP ECHO sweep; -PP option is used.
b. The attacker sends out an ICMP ECHO request packet to the target, and waits for an ICMP ECHO
reply response.
c. If the attacker does not receive an ICMP ECHO reply then the host is considered as down.
d. If the attacker does not receive an ICMP ECHO reply then the host is considered as live.
Correct Answer: b, c
Which of the following options are used for host discovery using TCP and UDP sweep respectively?
a. PE, PA
b. PP, PU
c. PM, PA
d. PA, PU
Correct Answer: d
If we want to disable host discovery in port scanning, then which of the following options
can be used?
a. F
b. p
c. Pn
d. sn
e. We cannot disable host discovery.
Correct Answer: c
Assignment- Week 5
Which of the following NMAP options can be used to run some of the nmap scripts?
a. PE
b. PU
c. A
d. O
e. sC
Correct Answer: c, e
Correct Answer: e
Which of the following tools/software can be used for scanning vulnerabilities?
a. Nessus
b. Hydra
c. crunch
d. hascat
e. NMAP
Correct Answer: a, e
Which of the following tools can be used to create a dictionary for dictionary-based
password attack?
a. Hydra
b. Crunch
c. SQLMAP
d. None of these.
Correct Answer: b
Assume that we want to connect to a target system (10.0.0.1) through ssh service, the
username and password are “user” and “pwd” respectively. Which of the following
commands can be used to create a ssh connection?
a. ssh 10.0.0.1 –l user -p pwd
b. ssh 10.0.0.1 -l user
c. ssh 10.0.0.1@user
d. None of these
Correct Answer: b, c
How many words will be generate by crunch tool if we use the crunch command as “crunch
1 2 0123456789” ?
Correct Answer: 110
Which of the following can be used for gaining same level privilege as the existing one?
a. Vertical privilege escalation.
b. Horizontal privilege escalation.
c. Diagonal privilege escalation.
d. Triangular privilege escalation.
e. None of these.
Correct Answer: b
Correct Answer: c
To download any file from the target system that is connected through FTP connection,
which of the following commands can be used?
a. put
b. get
c. upload
d. download
Correct Answer: b
Correct Answer: d
Correct Answer: e
Assignment- Week 6
Correct Answer: c
Correct Answer: a
Correct Answer: b, c
Correct Answer: a
25 parties want to exchange messages securely using a private key encryption algorithm. The
number of distinct key values required will be _________.
Correct Answer: 300
Correct Answer: b
Correct Answer: a
If a sender A wants to carry out encryption on a message and send it to receiver B using
public-key cryptography. Which of the following key will be used for decryption at receiver
end B?
a. A’s public key
b. A’s private key
c. B’s public key
d. B’s private key
Correct Answer: d
The effective key length use in AES encryption algorithm can be:
a. 64 bit
b. 128 bit
c. 192 bit
d. 256 bit
e. 513 bit.
Correct Answer: b, c, d
50 parties want to exchange messages securely using some public key encryption technique
like RSA. The number of distinct key values required will be __________.
Correct Answer: 100
Assignment- Week 7
Consider a hash function H that generates hash values h1 and h2, when fed with messages
m1 and m2 respectively. Which of the following options can never be true?
a. h1 and h2 are equal, but m1 and m2 are unequal.
b. m1 and m2 are equal, but h1 and h2 are unequal.
c. None of these.
Correct Answer: b
Correct Answer: a
Which of the following does not correspond to the first preimage resistance in the context of
hash functions?
a. It is difficult to find a message M such that HASH(M) = H, except for a few hash values H.
b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) =
HASH(M2).
c. It is difficult to find two messages M1 and M2 such that HASH(M1) and HASH(M2) and
unequal.
d. None of these.
Correct Answer: b, c
Which of the following is/are false for Unkeyed hash function (Modification Detection
Code)?
a. Unkeyed hash function is used to preserve integrity of message.
b. Unkeyed hash function is used to authenticate source of message.
c. Unkeyed hash function produces an output that depends only on the input data.
d. None of these.
Correct Answer: b
Hash functions are slower as compared to symmetric and public key encryption.
a. True
b. False
Correct Answer: b
What are the block size and key size of the DES algorithm?
a. 64 bits, 56 bits
b. 56 bits, 64 bits
c. 64 bits, 64 bits
d. 64 bits, 128 bits
Correct Answer: a
Correct Answer: a, c
Correct Answer: d
Assignment- Week 8
Correct Answer: a, b, c
Consider a gray-level image of size 100 x 100, where each pixel is stored in 8-bits
(representing a gray scale). The number of bytes of information can be hidden in the image
by using LSB steganography technique is _________.
Correct Answer: 1240 to 1260
Which of the following attacks refer to the situation where an attacker gains entry into the
victim machine (or spoofs the IP address) and then sends a ping request to a broadcast
address?
a. SYN flooding attack.
b. Smurf denial-of-service attack.
c. DNS spoofing attack.
d. None of these.
Correct Answer: b
Correct Answer: a
Which of the following statement(s) is/are false for HTTP Flood attack?
a. It is exclusively a type of Distributed-Denial-of-Service (DDoS) attack.
b. It overwhelms a target server using oversized ping packets.
c. It overwhelms a target server with HTTP request.
d. None of these.
Correct Answer: b
Correct Answer: c
Correct Answer: a, b
In Wireshark, which filter will show only packets for the IP address of 192.168.1.100?
a. ip == 192.168.1.100
b. ip.addr == 192.168.1.100
c. ip.address = 192.168.1.100
d. src == 192.168.1.100.
e. None of these.
Correct Answer: b
Correct Answer: c
Correct Answer: b
In Burp suite which of the following modules is used for auto crawling of webpages.
a. Spider
b. Scanner
c. Intruder
d. Proxy
e. None of these.
Correct Answer: a
Which of the following approach(es) can protect against sniffing?
a. Permanently add the MAC address of gateway to ARP cache.
b. Use unencrypted session such as telnet, ftp.
c. Restrict physical access to the network media.
d. Use static IP addresses and static ARP tables.
e. None of these.
Correct Answer: a, c, d
Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof
Correct Answer: d
Correct Answer: a, b, c
For mounting DoS attack using hping3 tool how many packets will be send per second if we
use --faster option?
a. 10
b. 100
c. 1000
d. 10000
Correct Answer: b
Assignment- Week 10
Correct Answer: a, b, c
Which of the following statement(s) is/are false for side channel attacks?
a. They exploit some weakness in the algorithm.
b. They exploit some weakness in the implementation of the algorithm.
c. They require physical access to the device.
d. They only require the set of inputs/outputs to the algorithm.
Correct Answer: a, d
Correct Answer: a, b, d
For modular exponentiation computation of x13, how many squaring and multiplication
operations would be required?
a. 3 and 2.
b. 3 and 3.
c. 3 and 4.
d. 4 and 2.
Correct Answer: a
What does power analysis do?
a. It measures variation in power consumption during a computation.
b. It attacks the power supply and feeds new power supply to the circuit.
c. It relies on the use of a hardware Trojan in the circuit.
d. All of these.
Correct Answer: a
Correct Answer: a
In which of the following lifecycle stage(s) of an IC, insertion of the Hardware Trojan is not
possible?
a. Specification.
b. Deployment.
c. Fabrication.
d. None of these.
Correct Answer: a, b
Which of the following statement(s) is/are true about Hardware Trojan?
a. It cannot replicate itself.
b. It is difficult to detect.
c. It does nothing harmful to the user’s computer system.
d. None of these.
Correct Answer: a, b
Correct Answer: a
In Metasploit to check the compatible target (OS) for any exploit, which of the following
command (option) is used?
a. Show targets
b. Set payloads
c. Set targets
d. Show payloads
e. None of these.
Correct Answer: a
Correct Answer: a
Which of the following commands can be used to get an administrative privilege in Metasploit
framework?
a. getsystem
b. hashdump
c. getuser
d. msfvenum
Correct Answer: a
Which of the following tools uses brute-force attack to extract existing and hidden pages of a
webserver?
a. DIRB
b. SQL MAP
c. Hydra
d. Crunch
e. None of these
Correct Answer: a
If a web page is vulnerable to blind sql injection attack, then which of the following is true?
a. It will print error message for an incorrect user input.
b. It will not print anything for an incorrect user input.
Correct Answer: b
Which of the following SQLMAP options is used to list all users along with hashed password?
a. - - users
b. - - passwords
c. - - user-pass
d. - - user-privileges
Correct Answer: b
Correct Answer: a, b
Assignment- Week 12
Which of the following can be done with the help of NMAP tool?
a. Determine the live host.
b. Determine the services running on any target system.
c. Determine the OS of the target systems.
d. Identify the vulnerabilities of the target system.
Correct Answer: a, b, c, d
Which of the following options cannot be used for host discovery using NMAP?
a. –PE
b. –PC
c. –PM
d. –PP
Correct Answer: b
In ICMP (ECHO) sweep scan, a scanner sends an ICMP type-8 packet and receives an ICMP type-
0 packet from target. What does it indicate?
a. Target is alive/up.
b. Target is down.
Correct Answer: a
Which of the following NMAP options can be used for TCP sweep scan?
a. –PE
b. –PP
c. –PM
d. None of these.
Correct Answer: d
To see why NMAP is reporting any port as open or close (or a host as up or down) which of the
following options is used?
a. --disable-arp-ping
b. --packet-trace
c. --show-reason
d. None of these.
Correct Answer: d
Which of the following sweep scans are automatically done when we use –sn option.
a. ICMP Echo
b. ICMP Non-Echo
c. TCP Sweep
d. UDP Sweep
Correct Answer: a, b, c
The number of host (IP) scanned by NMAP command “nmap –sL 192.168.62.40-50” will be
_________.
Correct Answer: 11
Which of the following NMAP options treats all hosts as online (skip host discovery)?
a. –sP
b. –PO
c. –sU
d. –Pn
Correct Answer: d
Which of the following NMAP options is used for Service and Version detection?
a. –sL
b. –sP
c. –PO
d. –sU
e. None of these.
Correct Answer: e