NPTEL Ethical Hacking Week 2 Assignment Answers 2024 (July-October)

The National Programme on Technology Enhanced Learning (NPTEL) provides a robust and comprehensive course on Ethical Hacking, aiming to equi...

The National Programme on Technology Enhanced Learning (NPTEL) provides a robust and comprehensive course on Ethical Hacking, aiming to equip participants with advanced skills in network security and defense mechanisms. Week 2 of this course delves into the intricacies of IP addressing and TCP/IP protocols, foundational elements crucial for any aspiring ethical hacker. Below, we present a detailed analysis and answers to the Week 2 assignment questions for the 2024 (July-October) session.

NPTEL Ethical Hacking Week 2 Assignment Answers 2024 (July-October)



Question 1: Which of the following statement(s) is/are true for transparent fragmentation?

  • Answer: a. The subsequent networks are aware that the fragmentation has occurred. c. Each fragment is treated as an independent packet.
  • Explanation: Transparent fragmentation ensures that each fragment of a packet is treated independently by subsequent networks, which are aware of the fragmentation but do not need to reassemble the packets.

Question 2: For reassembling the fragmented packets at the final destination, which of the following header field(s) is(are) used by IP?

  • Answer: a. Fragment offset e. Identification
  • Explanation: The Fragment Offset field indicates the position of the fragment in the original packet, while the Identification field helps in identifying which fragments belong to the same original packet.

Question 3: An IP packet arrives at the final destination with the D flag set as 1. Which of the following statement is true about the packet?

  • Answer: a. The packet has not been fragmented.
  • Explanation: The D flag (Don't Fragment flag) set to 1 means that the packet should not be fragmented, so if the packet arrives with this flag, it indicates no fragmentation has occurred.

Question 4: In an IP packet, the value of HLEN is 8, and the total size of IP packet is 1500 bytes. The number of data bytes in the packet will be ________.

  • Answer: 1480
  • Explanation: HLEN value of 8 means a header length of 32 bytes (8 * 4). Therefore, the data bytes are calculated as 1500 (total size) - 32 (header size) = 1468 bytes.

Question 5: Which of the following statement(s) is/are false for IP addressing?

  • Answer: d. None of these
  • Explanation: All the provided statements about IP addressing are true:
    • Each host connected to the Internet is defined by an IP address.
    • IP address consists of two parts: network number and host number.
    • When a packet is routed to the destination network, only the network number is used.

Question 6: Which address classes do the IP addresses 10.16.75.12 and 192.10.85.120 belong to?

  • Answer: d. Class A and Class C
  • Explanation: The IP address 10.16.75.12 falls under Class A (range 1.0.0.0 to 127.255.255.255), and 192.10.85.120 falls under Class C (range 192.0.0.0 to 223.255.255.255).

Question 7: Which of the following IP addresses does not represent a broadcast address?

  • Answer: e. 192.168.255.255
  • Explanation: 192.168.255.255 is a broadcast address. A non-broadcast address would be a specific, usable IP address within a subnet.

Question 8: Which of the following statement(s) is/are false for flag bits in TCP header?

  • Answer: d. None of these
  • Explanation: All provided statements about TCP header flag bits are true:
    • SYN=1 and ACK=0 represents a connection request message.
    • SYN=1 and ACK=1 represents a connection confirmation message.
    • RST bit is used to reset/reject a connection request.

Question 9: What is the subnet address if the destination IP address is 144.16.34.124 and the subnet mask is 255.255.240.0?

  • Answer: b. 144.16.34.0
  • Explanation: With a subnet mask of 255.255.240.0 (or /20), the subnet address for the given IP falls in the range of 144.16.32.0 - 144.16.47.255. Thus, the correct subnet address is 144.16.32.0.

Question 10: An organization is allotted an address block with beginning address as 144.16.192.24/29 in CIDR notation. What will be the address range for that block?

  • Answer: d. 144.16.192.24 to 144.16.192.31
  • Explanation: A /29 subnet allows for 8 IP addresses, from 144.16.192.24 to 144.16.192.31.

COMMENTS

Name

1sem,1,1st Sem,33,1st year,2,2 sem,1,2nd Sem,29,2sem,1,3rd Sem,40,4th sem,9,5th sem,28,6th sem,19,7th sem,8,8th sem,6,About BEU,1,ABOUT MAKAUT,1,aku civil Notes,15,Aku EE/EC Notes,14,aku ME Notes,14,aku notes,45,aku papers,11,aku syllabus,6,All Branch,2,all semester,19,B pharm,1,BAU Question Papers,1,BCA Notes,1,BEU Collage,12,BEU Model Paper Question,3,BEU Notes,10,BEU Organizer,31,BEU Previous Year Questions,2,Beu pyq,4,BEU PYQ Ans,5,BEU syllabus,8,Blogs,1,Btech results,1,Civil Branch,2,Civil Engineering,8,CS Engineering,8,CSE Branch,1,CSE Notes,19,Developing Soft Skills And Personality,13,EC Engineering,10,EE Branch,2,EE Engineering,9,engineering chemistry,5,Gate,1,internship,3,Introduction To Internet Of Things,21,Introduction To Machine Learning,2,iot,1,MAKAUT CE Organizer,6,MAKAUT CSE Organizer,5,MAKAUT ECE Organizer,3,MAKAUT EE Organizer,2,MAKAUT ME Organizer,4,MAKAUT Notes,5,MAKAUT Organizer,8,MAKAUT Question Paper,1,MAKAUT Syllabus,1,make money,6,ME Engineering,19,NPTEL,92,NPTEL COURSE,91,Programming Tutorial,12,Public Speaking,22,PYQ Solution,4,Question Bank,19,Soft Skills,33,Traffic & SEO,9,week 1,7,week 10,3,week 11,3,week 12,3,week 2,10,week 3,6,week 4,7,week 5,5,week 6,4,week 7,4,week 8,4,week 9,3,WEEK1,4,WEEK10,3,WEEK11,3,WEEK12,3,WEEK2,5,WEEK3,6,WEEK4,6,WEEK5,5,WEEK6,3,WEEK7,4,WEEK9,1,ztest,6,
ltr
item
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions: NPTEL Ethical Hacking Week 2 Assignment Answers 2024 (July-October)
NPTEL Ethical Hacking Week 2 Assignment Answers 2024 (July-October)
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtnwbsYUjihKvs0y_lq50VMswl5X5e5T3YOUon12YCRH3NrlDLnMNQ8Pquw9uSReH_whyOB4T55rBCnGjM8POBVBvmdMSf7wiAevIeJ0ErM1p6qb0J2j_NkJwx1bGmBGA5hDbJU5G7I-A5cFPkEdD48wKXmKqJNIPIqVTAKuhAVs-0uXI41bJMxSmQljLo/w400-h400/th%20(14).jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtnwbsYUjihKvs0y_lq50VMswl5X5e5T3YOUon12YCRH3NrlDLnMNQ8Pquw9uSReH_whyOB4T55rBCnGjM8POBVBvmdMSf7wiAevIeJ0ErM1p6qb0J2j_NkJwx1bGmBGA5hDbJU5G7I-A5cFPkEdD48wKXmKqJNIPIqVTAKuhAVs-0uXI41bJMxSmQljLo/s72-w400-c-h400/th%20(14).jpg
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions
https://www.beubihar.org.in/2024/07/nptel-ethical-hacking-week-2-assignment.html
https://www.beubihar.org.in/
https://www.beubihar.org.in/
https://www.beubihar.org.in/2024/07/nptel-ethical-hacking-week-2-assignment.html
true
8161375692651428750
UTF-8
Loaded All Posts Not found any posts VIEW ALL Read More Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content
×