MCQOPTIONS
Saved Bookmarks
This section includes 5 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number. |
| A. | TCP Spoofing |
| B. | TCP Blind Spoofing |
| C. | IP Spoofing |
| D. | IP Blind Spoofing |
| Answer» C. IP Spoofing | |
| 2. |
TLS vulnerability is also known as Return of Bleichenbacher s Oracle Threat. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 3. |
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________ |
| A. | address, name |
| B. | address, location |
| C. | network, name |
| D. | network, location |
| Answer» B. address, location | |
| 5. |
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command? |
| A. | ftp |
| B. | rexec |
| C. | tcpexec |
| D. | telnet |
| Answer» D. telnet | |