

MCQOPTIONS
Saved Bookmarks
This section includes 5 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN. |
A. | Switches |
B. | Routers |
C. | Hubs |
D. | Repeaters |
Answer» B. Routers | |
2. |
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
A. | VLAN attack |
B. | VLAN Circumvention |
C. | VLAN compromisation method |
D. | Data-link evading |
Answer» C. VLAN compromisation method | |
3. |
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» B. data-link | |
4. |
The full form of OSI is OSI model is ______________ |
A. | Open Systems Interconnection |
B. | Open Software Interconnection |
C. | Open Systems Internet |
D. | Open Software Internet |
Answer» B. Open Software Interconnection | |
5. |
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform. |
A. | TCP/IP |
B. | Cloud |
C. | OSI |
D. | OIS |
Answer» D. OIS | |