

MCQOPTIONS
Saved Bookmarks
This section includes 5 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number. |
A. | TCP Spoofing |
B. | TCP Blind Spoofing |
C. | IP Spoofing |
D. | IP Blind Spoofing |
Answer» C. IP Spoofing | |
2. |
TLS vulnerability is also known as Return of Bleichenbacher s Oracle Threat. |
A. | True |
B. | False |
Answer» B. False | |
3. |
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). |
A. | True |
B. | False |
Answer» B. False | |
4. |
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________ |
A. | address, name |
B. | address, location |
C. | network, name |
D. | network, location |
Answer» B. address, location | |
5. |
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command? |
A. | ftp |
B. | rexec |
C. | tcpexec |
D. | telnet |
Answer» D. telnet | |