nptel


NPTEL: Exam Registration is open now for July 2022 courses! 2022-06-27 Dear Candidate, Here is a golden opportunity for those who had previously enrolled in this course during the July 2021 semester, but could not participate in the exams or were absent/did not pass the exam for this course.



(i) The purpose of vulnerability scanning is to identify weakness of system/network in order to determine how a system can be exploited. (ii) NMAP script can be useful for automated scanning. However, scripts can have specific requirement. Answer: C. Both (i) and (ii) are true. Q2. Which of the following NMAP option runs some of the nmap scripts?



For me NPTEL is the best platform for online learning since there is no prequalification, no age limit, and no entrance criteria to enrol. I feel myself privileged to be in the line of eminent learners from the world known organizations like ISRO, DRDO, Chennai Metro, and TCS etc.



This course is aimed at anyone interested in learning ethical hacking in Hindi, including students, professionals, and business owners. The course covers a wide range of topics, including the basics of ethical hacking, the different types of cyber attacks, and the tools and techniques used by ethical hackers to identify and mitigate cyber threats.



NPTEL provides E-learning through online Web and Video courses various streams.



Ethical Hacking NPTEL 2023 Week 3 Assignment Solutions. Q1. Which of the following statement(s) is/are true? a. IP protocol uses connection-oriented routing. b. IP protocol uses connection-less routing c.1P protocol is a host-to-host layer. d. In connection-less routing, each packet is treated as an independent packet. e. None of these. Show Answer



For any queries regarding the NPTEL website, availability of courses or issues in accessing courses, please contact . NPTEL Administrator, IC & SR, 3rd floor IIT Madras, Chennai - 600036 Tel : (044) 2257 5905, (044) 2257 5908, 9363218521 (Mon-Fri 9am-6pm) Email : [email protected]



Week 1: Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack. Week 2: IP addressing and routing. TCP and UDP. IP subnets. Week 3: Routing protocols. IP version 6. Week 4: Installation of attacker and victim system. Information gathering using advanced google search,