nptel week 4 assignment answers

Nptel week 4 assignment answers

Kindly Wait! NOTE: You can check your answer immediately by clicking show answer button. Which of the following information cannot be retrieved using active reconnaissance?

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can then be resolved before a malicious attacker has the opportunity to exploit them. Next Week Answers: Assignment 04???? Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only.

Nptel week 4 assignment answers

Baum-Welch algorithm is an example of — [Marks 1] a. Forward-backward a l gorithm b. Special case of the Expectation-maximization algorithm c. Both A and B c. Please note that each xi is an observed variable and each zi can belong to one of classes for hidden state. What will be the size of the state transition matrix, and the emission matrix, respectively for this example. You are building a model distribution for an infinite stream of word tokens. You know that the source of this stream has a vocabulary of size Out of these words y o u know of words to be stop words each of which has a probability of 0. With only this knowledge what is the maximum possible entropy of the modelled distribution.

The services running on the target system. IP address of system f.

.

Which of the following is the correct statement for creating a package? It searches in the current directory. A user can set the path during runtime using the -classpath option. Using the -path option, a user can set the path. Java packages are hierarchical. Java can have a nested class structure. The Java static kevword is a non-access modifier. Java supports both pre-defined and user-defined packages. Packages are used to organize a set of related classes and interfaces. Pre-defined packages help to develop programs easily by providing thousands of classes.

Nptel week 4 assignment answers

Computer networks and internet protocols are essential components of today's technology-driven world. They allow devices to connect and communicate with one another, enabling the sharing of information and resources. Multiple choice questions MCQs on this topic test a student's understanding of the various concepts and protocols involved in computer networks and internet communication. This is the most common port number used for web traffic and is the default port for HTTP connections.

K maraş opel corsa

What is the purpose of the following NMAP command? Which of the following can be used to reconnaissance countermeasures? In many applications, like POS tagging, one is interested in finding the hidden state sequence Q, for a given observation sequence, that maximizes P O, Q; 0. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Use log base 10 for entropy calculation [Mark s 2] a. Your email address will not be published. Please note that each xi is an observed variable and each zi can belong to one of classes for hidden state. Of the order of N2. You are building a model distribution for an infinite stream of word tokens. PA, PU. Which of the following search operators can narrow down the search results to a specific website? Size of the network.

Course Link: Click Here.

Information about the target is collected directly. The services running on the target system. None of these. ACK c. Note:- We are going to post answers for all weeks you can join us on telegram for regular updates and if there are any changes in answers then will update on our telegram channel only. Computer names C. Which of the following search operators can narrow down the search results to a specific website? History of the website. Which of the following option can be used along with —sS option to directly start port scanning? Answer: a. Which of the following can be used to retrieve the deleted data and all pages available with any website? RST b. If we want to disable host discovery in port scanning, then which of the following options can be used? Use firewalls.

1 thoughts on “Nptel week 4 assignment answers

Leave a Reply

Your email address will not be published. Required fields are marked *