Explore topic-wise MCQs in Cyber Security.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

WHICH_OF_THE_FOLLOWING_IS_NOT_A_VULNERABILITY_OF_THE_NETWORK_LAYER??$

A. Route spoofing
B. Identity & Resource ID Vulnerability
C. IP Address Spoofing
D. Weak or non-existent authentication
Answer» E.
2.

Which_of_the_following_is_an_example_of_physical_layer_vulnerability?$

A. MAC Address Spoofing
B. Physical Theft of Data
C. Route spoofing
D. Weak or non-existent authentication
Answer» C. Route spoofing
3.

Which of the following is an example of data-link layer vulnerability?

A. Physical Theft of Data
B. VLAN circumvention
C. Route spoofing
D. Weak or non-existent authentication
Answer» C. Route spoofing
4.

Which of the following is an example of physical layer vulnerability?

A. MAC Address Spoofing
B. Route spoofing
C. Weak or non-existent authentication
D. Keystroke & Other Input Logging
Answer» E.
5.

Which of the following is an example of network layer vulnerability?

A. MAC Address Spoofing
B. Physical Theft of Data
C. Route spoofing
D. Weak or non-existent authentication
Answer» D. Weak or non-existent authentication
6.

________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN?

A. Switches
B. Routers
C. Hubs
D. Repeaters
Answer» B. Routers
7.

____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. VLAN attack
B. VLAN Circumvention
C. VLAN compromisation method
D. Data-link evading
Answer» C. VLAN compromisation method
8.

Which of the following is not a vulnerability of the data-link layer?

A. MAC Address Spoofing
B. VLAN circumvention
C. Switches may be forced for flooding traffic to all VLAN ports
D. Overloading of transport-layer mechanisms
Answer» E.
9.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

A. True
B. False
Answer» B. False
10.

In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» B. data-link
11.

Which of the following is not physical layer vulnerability?

A. Physical theft of data & hardware
B. Physical damage or destruction of data & hardware
C. Unauthorized network access
D. Keystroke & Other Input Logging
Answer» D. Keystroke & Other Input Logging
12.

The full form of OSI is OSI model is ______________

A. Open Systems Interconnection
B. Open Software Interconnection
C. Open Systems Internet
D. Open Software Internet
Answer» B. Open Software Interconnection
13.

The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.

A. TCP/IP
B. Cloud
C. OSI
D. OIS
Answer» D. OIS