Ethical Hacking | Week 1

Ethical Hacking Week 1 Assignment Answers

Course Link:

Q1) In which of the following penetration testing models, no information about the network is given to tester?
a. White box model.
b. Black box model.
c. Red box Model.
d. Gray box model.
e. None of these.

Q2) Which of the following statement(s) is/are true for a circuit switched network?
a. A communication link can be shared by more than one connection.
b. A communication link is dedicated to a connection and cannot be shared with other connections.
c. The packet transfer delay between a pair of nodes may depend on the prevailing network traffic.
d. The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
e. It is efficient for bursty traffic.

Q3) A 1000 byte packet is sent over a 50 kilo-bits-per-second (Kbps) point-to-point link whose propagation delay is 10 msec. The packet will reach the destination after ________ msec. (Assume 1K = 1000)


Q4) Which of the following statement(s) is/are true for virtual circuit based packet transfer approach?
a. It is a connection-oriented approach, where a route is established priori to transfer of packets.
b. In this approach, each packets follows distinct path.
c. The intermediate node can perform dynamic routing.
d. All the packets reach in order to the destination.
e. It is a true packet switched network.

Q5) Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?
a. Session layer
b. Transport layer
c. Network layer
d. Datalink layer
e. Physical layer

Q6) Which of the following is/are false for TCP/IP model?
a. It allows cross-platform communications among heterogeneous networks.
b. It is a scalable client-server architecture which allows network modification without disrupting the current services.
c. It can also represent any other protocol stack other than the TCP/IP suite such as Bluetooth connection.
d. None of these.

Q7) Which of the following is true for the IP?
a. It uniquely identifies a network interface of a computer system.
b. It uniquely identifies a host in the network.
c. It indicates how many hardware ports are there in the computer system.
d. None of these.

Q8) How many bits are used for IP address (in IP version 4) and port number respectively
a. 32,8
b. 32, 16
c. 48, 8
d. 48, 16

Q9) If a 2000 byte data message is sent using a TFTP, the corresponding Ethernet packet will be of size ________ bytes.


Q10) If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field ______?


* The material and content uploaded on this website are for general information and reference purposes only and don’t copy the answers of this website to any other domain without any permission or else copyright abuse will be in action.

Please do it by your own first! Protection Status

5 1 vote
Article Rating
Notify of

Inline Feedbacks
View all comments
close button
Would love your thoughts, please comment.x