NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Ethical Hacking
Assignment- Week 4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 10 Total mark: 10 x 1 = 10
______________________________________________________________________________
QUESTION 1:
Which of the following statement(s) is/are true?
a. A hypervisor allows one host to run multiple virtual machines by sharing resources.
b. A hypervisor requires one physical machine per virtual machine.
c. A hypervisor can only run one virtual machine at a time.
d. Kali-linux is hack proof hypervisor.
e. None of these.
Correct Answer: a
Detailed Solution: Hypervisor or Virtual Machine Monitor is a software tool that allows the creation
and running of one or more virtual machines (VMs) on a computer system; each system can use the
resources of main system (host system) such as memory, network interface, storage etc. This is very
essential for security practice. Kali Linux is a specific Linux distribution based on Debian. It consists of a
large collection of tools for carrying out penetration testing, security research, computer forensics, etc.
The correct option is (a).
______________________________________________________________________________
QUESTION 2:
Which of the following statement(s) is/are true about “Passive Reconnaissance”?
a. Information about the target is collected indirectly.
b. Information about the target is collected directly.
c. There is a chance of detection.
d. There is no chance of detection.
Correct Answer: a, d
Detailed Solution: Reconnaissance is the process of gathering information about a target network or
system. In passive reconnaissance the information is collected indirectly, i.e. web browsing. The attacker
and victim do not communicate directly, and thus there is no chance of detection. In active
reconnaissance, we collect information about a target directly, e.g., nmap scan. As the attacker and
victim communicate directly, there is a chance of detection.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
The true options are (a) and (d).
______________________________________________________________________________
QUESTION 3:
Which operator is used in Google to search for an exact phrase?
a. AND
b. “ ” (double quotes)
c. +
d. ()
Correct Answer: b
Detailed Solution: Putting a phrase inside double quotes tells Google to search for that exact
sequence of words in that order.
The correct option is (b).
______________________________________________________________________________
QUESTION 4:
What does a WHOIS lookup provides?
a. Website loading speed.
b. Source code of webpage
c. Historical screenshot of website
d. Ownership and registration details of a domain.
Correct Answer: d
Detailed Solution: WHOIS is a tool used to find details like domain owner name, registrar,
registration date, and expiration date.
The correct option is (d).
______________________________________________________________________________
QUESTION 5:
Which search will show results from only the website swayam.gov.in?
a. swayam.gov.in
b. filetype:swayam.gov.in
c. site:swayam.gov.in
d. None of these
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Correct Answer: c
Detailed Solution: just writing the website may show result from other websites as well, site
operator limits the search to a specific website or domain, filetype operator filters by file type
and not domain.
The correct option is (c).
______________________________________________________________________________
QUESTION 6:
What is the main function of Archive.org’s Wayback Machine?
a. To view historical version of the website
b. To scan website for malware
c. To test internet speed.
d. To monitor websites uptime
Correct Answer: a
Detailed Solution: The Wayback Machine allows users to see snapshots of websites from the
past, useful for research, legal reference, or digital preservation.
The correct option is (a).
______________________________________________________________________________
QUESTION 7:
An ICMP sweep scan is used to:
a. Block TCP connection
b. Scan for DNS servers
c. Detect live hosts
d. Detect phishing emails.
Correct Answer: c
Detailed Solution: ICMP sweep scan is used to detect live hosts in a network. In ICMP sweep, the
attacker sends out an ICMP ECHO request packet (ICMP type 8) to the target. If it receives an ICMP
ECHO reply packet, it assumes that the target is alive.
The correct option is (c).
____________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 8:
Which of the following tools is primarily used for network scanning, including host discovery and port
scanning?
a. Wireshark
b. DNSEnum
c. Notepad++
d. None of these
Correct Answer: d
Detailed Solution: Wireshark is a packet capturing and analysis tool — it does not perform scanning
(like discovering hosts or ports). DNSEnum is used for DNS enumeration, not general port or host
scanning. Notepad++ is simply a text/code editor. Tools like Nmap and Nessus are specifically used for
network scanning, including host discovery and port scans.
The correct option is (d).
____________________________________________________________________________
QUESTION 9:
Which of the following option tells NMAP to skip port scanning and perform only host discovery?
a. –sS
b. –O
c. -sn
d. -p
Correct Answer: c
Detailed Solution: -sn tells Nmap to skip port scanning and perform only host discovery (also known
as ping scan). -sS → SYN scan (port scan); -O → OS detection; -p → specifies ports to scan.
The correct option is (c).
____________________________________________________________________________
QUESTION 10:
How many ports does NMAP scan by default when no specific port option is provided________?
Correct Answer: 1000
Detailed Solution: Nmap scans the 1,000 most commonly used ports by default for TCP and
UDP.
_____________________________________________________________________________
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
********END*******