18/05/2018 Information security - IV - - Unit 6 - Week 4
https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 1/4
X
Courses » Information security - IV
Unit 6 - Week 4
reviewer1@nptel.iitm.ac.in ▼
Announcements Course Ask a Question Progress Mentor
Course outline
Week - 0 Practice Quizzes
Week - 1 Week - 2 Week - 3 Week 4
Week 5 Week 6 Week 7 Week 8
DOWNLOAD VIDEOS
Quiz : Assignment 4 Serverside Attacks: Tools in Kali Linux (Contd.) Serverside Attacks: Tools in Kali Linux (Contd.) Client Side Attacks - Tools in Kali Linux - 1 Client Side Attacks - Tools in Kali Linux - 2 Client Side Attacks - Tools in Kali Linux - 3 Client Side Attacks - Tools in Kali Linux - 4 Week 4 Feedback
Due on 2018-03-07, 23:59 IST.
1 point 1)
1 point 2)
1 point 3)
1 point 4)
Assignment 4
The due date for submitting this assignment has passed.
Submitted assignment
Which tool could be used to do brute force attack web portals?
Webslayer Nmap ICMP Fierce
No, the answer is incorrect.
Score: 0
Accepted Answers:
Webslayer
Pick the odd one out of the below choices:
Accept-Encoding Referrer
Cache-control
Nmap
No, the answer is incorrect.
Score: 0
Accepted Answers:
Nmap
Which among the following is the odd one out:
Webslayer arpspoof John the Ripper Zenmap
No, the answer is incorrect.
Score: 0
Accepted Answers:
John the Ripper
What Linux command can be used to make all the words in a file to be of the same case?
sort ls
18/05/2018 Information security - IV - - Unit 6 - Week 4
https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 2/4
0 points 5)
1 point 6)
1 point 7)
1 point 8)
1 point 9)
tr
None of the above No, the answer is incorrect.
Score: 0
Accepted Answers:
tr
SET Toolkit can be invoked in command line by using the following command:
se-toolkit toolkit setoolkit
None of the above No, the answer is incorrect.
Score: 0
Accepted Answers:
se-toolkit
SET is based on which of the following programming languages:
C Perl C++
Python
No, the answer is incorrect.
Score: 0
Accepted Answers:
Python
What is the maximum number of hosts that can be scanned by Nessus Home edition?
4 8 12 16
No, the answer is incorrect.
Score: 0
Accepted Answers:
16
What is the default port number in which the Nessus management interface server would be listening?
8000 8080 8834
None of the above No, the answer is incorrect.
Score: 0
Accepted Answers:
8834
Which one of the following is the ODD one:
Guess
Dictionary Attack Brute force None of the above
18/05/2018 Information security - IV - - Unit 6 - Week 4
https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 3/4
1 point 10)
0 points 11)
1 point 12)
No, the answer is incorrect.
Score: 0
Accepted Answers:
None of the above
Which of the following is NOT a generally used Hashing algorithm?
MD5 SHA256 SHA512 RSA
No, the answer is incorrect.
Score: 0
Accepted Answers:
RSA
Which one of the following is an odd one out:
John Hashcat Ohashcat
None of the above No, the answer is incorrect.
Score: 0
Accepted Answers:
None of the above
Which tool is used to reset the password on Windows systems?
samdump samdump2 chntpw
None of the above No, the answer is incorrect.
Score: 0
Accepted Answers:
chntpw
Previous Page End
A project of In association with
Funded by
© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -
18/05/2018 Information security - IV - - Unit 6 - Week 4
https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 4/4
Powered by