MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHICH_OF_THE_FOLLOWING_IS_NOT_A_VULNERABILITY_OF_THE_NETWORK_LAYER??$ |
| A. | Route spoofing |
| B. | Identity & Resource ID Vulnerability |
| C. | IP Address Spoofing |
| D. | Weak or non-existent authentication |
| Answer» E. | |
| 2. |
Which_of_the_following_is_an_example_of_physical_layer_vulnerability?$ |
| A. | MAC Address Spoofing |
| B. | Physical Theft of Data |
| C. | Route spoofing |
| D. | Weak or non-existent authentication |
| Answer» C. Route spoofing | |
| 3. |
Which of the following is an example of data-link layer vulnerability? |
| A. | Physical Theft of Data |
| B. | VLAN circumvention |
| C. | Route spoofing |
| D. | Weak or non-existent authentication |
| Answer» C. Route spoofing | |
| 4. |
Which of the following is an example of physical layer vulnerability? |
| A. | MAC Address Spoofing |
| B. | Route spoofing |
| C. | Weak or non-existent authentication |
| D. | Keystroke & Other Input Logging |
| Answer» E. | |
| 5. |
Which of the following is an example of network layer vulnerability? |
| A. | MAC Address Spoofing |
| B. | Physical Theft of Data |
| C. | Route spoofing |
| D. | Weak or non-existent authentication |
| Answer» D. Weak or non-existent authentication | |
| 6. |
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN? |
| A. | Switches |
| B. | Routers |
| C. | Hubs |
| D. | Repeaters |
| Answer» B. Routers | |
| 7. |
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
| A. | VLAN attack |
| B. | VLAN Circumvention |
| C. | VLAN compromisation method |
| D. | Data-link evading |
| Answer» C. VLAN compromisation method | |
| 8. |
Which of the following is not a vulnerability of the data-link layer? |
| A. | MAC Address Spoofing |
| B. | VLAN circumvention |
| C. | Switches may be forced for flooding traffic to all VLAN ports |
| D. | Overloading of transport-layer mechanisms |
| Answer» E. | |
| 9. |
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 10. |
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware. |
| A. | physical |
| B. | data-link |
| C. | network |
| D. | application |
| Answer» B. data-link | |
| 11. |
Which of the following is not physical layer vulnerability? |
| A. | Physical theft of data & hardware |
| B. | Physical damage or destruction of data & hardware |
| C. | Unauthorized network access |
| D. | Keystroke & Other Input Logging |
| Answer» D. Keystroke & Other Input Logging | |
| 12. |
The full form of OSI is OSI model is ______________ |
| A. | Open Systems Interconnection |
| B. | Open Software Interconnection |
| C. | Open Systems Internet |
| D. | Open Software Internet |
| Answer» B. Open Software Interconnection | |
| 13. |
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform. |
| A. | TCP/IP |
| B. | Cloud |
| C. | OSI |
| D. | OIS |
| Answer» D. OIS | |