MCQOPTIONS
Saved Bookmarks
This section includes 5 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
| A. | Switches |
| B. | Routers |
| C. | Hubs |
| D. | Repeaters |
| Answer» B. Routers | |
| 2. |
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
| A. | VLAN attack |
| B. | VLAN Circumvention |
| C. | VLAN compromisation method |
| D. | Data-link evading |
| Answer» C. VLAN compromisation method | |
| 3. |
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware. |
| A. | physical |
| B. | data-link |
| C. | network |
| D. | application |
| Answer» B. data-link | |
| 4. |
The full form of OSI is OSI model is ______________ |
| A. | Open Systems Interconnection |
| B. | Open Software Interconnection |
| C. | Open Systems Internet |
| D. | Open Software Internet |
| Answer» B. Open Software Interconnection | |
| 5. |
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform. |
| A. | TCP/IP |
| B. | Cloud |
| C. | OSI |
| D. | OIS |
| Answer» D. OIS | |