

MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
WHICH_OF_THE_FOLLOWING_IS_NOT_A_VULNERABILITY_OF_THE_NETWORK_LAYER??$ |
A. | Route spoofing |
B. | Identity & Resource ID Vulnerability |
C. | IP Address Spoofing |
D. | Weak or non-existent authentication |
Answer» E. | |
2. |
Which_of_the_following_is_an_example_of_physical_layer_vulnerability?$ |
A. | MAC Address Spoofing |
B. | Physical Theft of Data |
C. | Route spoofing |
D. | Weak or non-existent authentication |
Answer» C. Route spoofing | |
3. |
Which of the following is an example of data-link layer vulnerability? |
A. | Physical Theft of Data |
B. | VLAN circumvention |
C. | Route spoofing |
D. | Weak or non-existent authentication |
Answer» C. Route spoofing | |
4. |
Which of the following is an example of physical layer vulnerability? |
A. | MAC Address Spoofing |
B. | Route spoofing |
C. | Weak or non-existent authentication |
D. | Keystroke & Other Input Logging |
Answer» E. | |
5. |
Which of the following is an example of network layer vulnerability? |
A. | MAC Address Spoofing |
B. | Physical Theft of Data |
C. | Route spoofing |
D. | Weak or non-existent authentication |
Answer» D. Weak or non-existent authentication | |
6. |
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN? |
A. | Switches |
B. | Routers |
C. | Hubs |
D. | Repeaters |
Answer» B. Routers | |
7. |
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls. |
A. | VLAN attack |
B. | VLAN Circumvention |
C. | VLAN compromisation method |
D. | Data-link evading |
Answer» C. VLAN compromisation method | |
8. |
Which of the following is not a vulnerability of the data-link layer? |
A. | MAC Address Spoofing |
B. | VLAN circumvention |
C. | Switches may be forced for flooding traffic to all VLAN ports |
D. | Overloading of transport-layer mechanisms |
Answer» E. | |
9. |
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. |
A. | True |
B. | False |
Answer» B. False | |
10. |
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware. |
A. | physical |
B. | data-link |
C. | network |
D. | application |
Answer» B. data-link | |
11. |
Which of the following is not physical layer vulnerability? |
A. | Physical theft of data & hardware |
B. | Physical damage or destruction of data & hardware |
C. | Unauthorized network access |
D. | Keystroke & Other Input Logging |
Answer» D. Keystroke & Other Input Logging | |
12. |
The full form of OSI is OSI model is ______________ |
A. | Open Systems Interconnection |
B. | Open Software Interconnection |
C. | Open Systems Internet |
D. | Open Software Internet |
Answer» B. Open Software Interconnection | |
13. |
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform. |
A. | TCP/IP |
B. | Cloud |
C. | OSI |
D. | OIS |
Answer» D. OIS | |