NPTEL Ethical Hacking Week 1 Answers 2023

Hey Students, In this Post, you will find NPTEL Ethical Hacking Week 1 Assignment 1 Answers 2023. All the Answers are provided below to help the students. First try to solve the questions by yourself. If you find any difficulty, then look for the solutions.

For Answers:

NPTEL Ethical Hacking Week 1 Answers 2023
NPTEL Ethical Hacking Week 1 Answers 2023

NPTEL Ethical Hacking Week 1 Answers 2023:

Q.1. In which of the following penetration testing models, no information about the network is given to tester?

  • White box model.
  • Black box model.
  • Red box Model.
  • Gray box model.
  • None of these


Q.2. Which of the following statement(s) is/are true for a circuit switched network?

  • A communication link can be shared by more than one connection.
  • A communication link is dedicated to a connection and cannot be shared with other connections.
  • The packet transter delay between a pair of nodes may depend on the prevailing network traffic.
  • The packet transfer delay between a pair of nodes is more or less constant during the entire period of the connection.
  • It is efficient for bursty traffic.



Q.4. Which of the following statement(s) is/are true for virtual circuit based packet transfer approach ?

  • It is a connection-oriented approach, where a route is established priori to transfer of packets.
  • In this approach, each packets follows distinct path.
  • The intermediate node can perform dynamic routing.
  • All the packets reach in order to the destination. It is a true packet switched network.


Q.5. Which of the following OSI layers is responsible for end-to-end reliable data transfer, with error recovery and flow control?

  • Session layer
  • Transport layer
  • Network layer
  • Datalink layer
  • Physical layer


Q.6. Which of the following is/are false for TCP/IP model?

  • It allows cross-platform communications among heterogeneous networks.
  • It is a scalable client-server architecture which allows network modification without disrupting the current services.
  • It can also represent any other protocol stack other than the TCP/IP suite such as Bluetooth connection.
  • None of these.


Q.7. Which of the following is true for the IP?

  • It uniquely identifies a network interface of a computer system.
  • It uniquely identifies a host in the network.
  • It indicates how many hardware ports are there in the computer system.
  • None of these.


NPTEL Ethical Hacking Week 1 Answers👇

Q.8. How many bits are used for IP address (in IP version 4) and port number respectively?

  • 32,8
  • 32, 16
  • 48, 8
  • 48, 16


Q.9. If a 2000 byte data message is sent using a IFTP, the corresponding Ethernet packet will be of Size_________ bytes.


Q.10. If the IP header is 192 bits long, what will be the value (in decimal) of the “HLEN” field______?


Disclaimer: This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by freshersworkjob. This tutorial is only for Discussion and Learning purpose.

About NPTEL Ethical Hacking Course:

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them.

Course Layout:

  • Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
  • Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
  • Week 3:   Routing protocols. IP version 6.
  • Week-4:   Installation of attacker and victim system. Information gathering using advanced google search,, netcraft, whois, host, dig, dnsenum and NMAP tool.
  • Week-5:  Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment System Hacking: password cracking, privilege escalation, application execution. Malware and Virus. ARP spoofing and MAC attack.
  • Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
  • Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
  • Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email security.
  • Week-9:   Packet sniffing using wireshark and burpsuite, password attack using burp suite. Social engineering attacks and Denial of service attacks.
  • Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.
  • Week-11: Different types of attacks using Metasploit framework: password cracking, privilege escalation, remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site scripting.
  • Week 12: Case studies: various attacks scenarios and their remedies.

If you have not registered for exam kindly register Through


Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Leave a Comment