• Tidak ada hasil yang ditemukan

Unit 6 - Week 4

N/A
N/A
Protected

Academic year: 2024

Membagikan "Unit 6 - Week 4"

Copied!
4
0
0

Teks penuh

(1)

18/05/2018 Information security - IV - - Unit 6 - Week 4

https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 1/4

X

Courses » Information security - IV

Unit 6 - Week 4

reviewer1@nptel.iitm.ac.in

Announcements Course Ask a Question Progress Mentor

Course outline

Week - 0 Practice Quizzes

Week - 1 Week - 2 Week - 3 Week 4

Week 5 Week 6 Week 7 Week 8

DOWNLOAD VIDEOS

Quiz : Assignment 4 Serverside Attacks: Tools in Kali Linux (Contd.) Serverside Attacks: Tools in Kali Linux (Contd.) Client Side Attacks - Tools in Kali Linux - 1 Client Side Attacks - Tools in Kali Linux - 2 Client Side Attacks - Tools in Kali Linux - 3 Client Side Attacks - Tools in Kali Linux - 4 Week 4 Feedback

Due on 2018-03-07, 23:59 IST.

1 point 1)

1 point 2)

1 point 3)

1 point 4)

Assignment 4

The due date for submitting this assignment has passed.

Submitted assignment

Which tool could be used to do brute force attack web portals?

Webslayer Nmap ICMP Fierce

No, the answer is incorrect.

Score: 0

Accepted Answers:

Webslayer

Pick the odd one out of the below choices:

Accept-Encoding Referrer

Cache-control

Nmap

No, the answer is incorrect.

Score: 0

Accepted Answers:

Nmap

Which among the following is the odd one out:

Webslayer arpspoof John the Ripper Zenmap

No, the answer is incorrect.

Score: 0

Accepted Answers:

John the Ripper

What Linux command can be used to make all the words in a file to be of the same case?

sort ls

(2)

18/05/2018 Information security - IV - - Unit 6 - Week 4

https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 2/4

0 points 5)

1 point 6)

1 point 7)

1 point 8)

1 point 9)

tr

None of the above No, the answer is incorrect.

Score: 0

Accepted Answers:

tr

SET Toolkit can be invoked in command line by using the following command:

se-toolkit toolkit setoolkit

None of the above No, the answer is incorrect.

Score: 0

Accepted Answers:

se-toolkit

SET is based on which of the following programming languages:

C Perl C++

Python

No, the answer is incorrect.

Score: 0

Accepted Answers:

Python

What is the maximum number of hosts that can be scanned by Nessus Home edition?

4 8 12 16

No, the answer is incorrect.

Score: 0

Accepted Answers:

16

What is the default port number in which the Nessus management interface server would be listening?

8000 8080 8834

None of the above No, the answer is incorrect.

Score: 0

Accepted Answers:

8834

Which one of the following is the ODD one:

Guess

Dictionary Attack Brute force None of the above

(3)

18/05/2018 Information security - IV - - Unit 6 - Week 4

https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 3/4

1 point 10)

0 points 11)

1 point 12)

No, the answer is incorrect.

Score: 0

Accepted Answers:

None of the above

Which of the following is NOT a generally used Hashing algorithm?

MD5 SHA256 SHA512 RSA

No, the answer is incorrect.

Score: 0

Accepted Answers:

RSA

Which one of the following is an odd one out:

John Hashcat Ohashcat

None of the above No, the answer is incorrect.

Score: 0

Accepted Answers:

None of the above

Which tool is used to reset the password on Windows systems?

samdump samdump2 chntpw

None of the above No, the answer is incorrect.

Score: 0

Accepted Answers:

chntpw

Previous Page End

A project of In association with

Funded by

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -

(4)

18/05/2018 Information security - IV - - Unit 6 - Week 4

https://onlinecourses.nptel.ac.in/noc18_cs24/unit?unit=26&assessment=28 4/4

Powered by

Referensi

Dokumen terkait

To make its score reliability improved, the test employs a carefully designed answer key with samples of correct answers (see Appendix 3) and has a number of tasks and

Teacher reminds pupils to bring their costumes based on the selected celebration and food for the open house2.

While, there are 10 (67%) students who chose incorrect answer, they are 7 students choose “B.. the different eggs. From the data above, there are 5 students who choose

The author regrets that in the above article, incorrect details were given in Materials and methods, Section 2.4 Nylon bag experiments. All

i First session Budget -Answer ii Second session Monsoon iii Third session winter iv none of the above 89.Which of the following States do not have bicameral legislature?. iBihar ii

None of the above *Indicates correct answer Appendix e-2: Intra-lesson Quiz Question Samples A person is said to have dementia due to Alzheimer disease when: A?. Minor changes have

reviewer1@nptel.iitm.ac.in ▼ Announcements Course Ask a Question Progress Course outline Registration for MATLAB Exam How to access the portal MATLAB Online Access MATLAB Tutorials

Score: 0 Accepted Answers: Decreases up to a certain temperature then increases due to carbide formation and then decreases again The most favourable microstructure in welding of Q&T