MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of them is not an attack done in the network layer of the TCP/IP model? |
| A. | MITM attack |
| B. | DoS attack |
| C. | Spoofing attack |
| D. | Shoulder surfing |
| Answer» E. | |
| 2. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. |
| A. | SYN flooding attack |
| B. | ACK flooding attack |
| C. | SYN & ACK flooding attack |
| D. | Packet flooding attack |
| Answer» B. ACK flooding attack | |
| 3. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number. |
| A. | TCP Spoofing |
| B. | TCP Blind Spoofing |
| C. | IP Spoofing |
| D. | IP Blind Spoofing |
| Answer» C. IP Spoofing | |
| 4. |
There are __________ different versions of IP popularly used. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 5. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
_____________IS_AN_ATTACK_WHERE_THE_ATTACKER_IS_ABLE_TO_GUESS_TOGETHER_WITH_THE_SEQUENCE_NUMBER_OF_AN_IN_PROGRESS_COMMUNICATION_SESSION_&_THE_PORT_NUMBER.?$ |
| A. | TCP Spoofing |
| B. | TCP Blind Spoofing |
| C. | IP Spoofing |
| D. | IP Blind Spoofing |
| Answer» C. IP Spoofing | |
| 7. |
Which of them is not an attack done in the network layer of the TCP/IP model?$ |
| A. | MITM attack |
| B. | DoS attack |
| C. | Spoofing attack |
| D. | Shoulder surfing |
| Answer» E. | |
| 8. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.$ |
| A. | SYN flooding attack |
| B. | ACK flooding attack |
| C. | SYN & ACK flooding attack |
| D. | Packet flooding attack |
| Answer» B. ACK flooding attack | |
| 9. |
____________ protocol attack is done in the data-link layer. |
| A. | HTTP |
| B. | DNS |
| C. | TCP/IP |
| D. | POP |
| Answer» C. TCP/IP | |
| 10. |
Which of the protocol is not used in the network layer of the TCP/IP model? |
| A. | ICMP |
| B. | IP |
| C. | IGMP |
| D. | HTTP |
| Answer» E. | |
| 11. |
Which 2 protocols are used in the Transport layer of the TCP/IP model? |
| A. | UDP and HTTP |
| B. | TCP and UDP |
| C. | HTTP and TCP |
| D. | ICMP and HTTP |
| Answer» C. HTTP and TCP | |
| 12. |
Which of them is not an appropriate method of router security? |
| A. | Unused ports should be blocked |
| B. | Unused interfaces and services should be disabled |
| C. | Routing protocol needs to be programmed by security experts |
| D. | Packet filtering needs to be enabled |
| Answer» D. Packet filtering needs to be enabled | |
| 13. |
RoBOT is abbreviated as ___________ |
| A. | Return of Bleichenbacher’s Oracle Team |
| B. | Rise of Bleichenbacher’s Oracle Threat |
| C. | Return of Bleichenbacher’s Operational Threat |
| D. | Return of Bleichenbacher’s Oracle Threat |
| Answer» E. | |
| 14. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 15. |
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). |
| A. | True |
| B. | False |
| Answer» B. False | |
| 16. |
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________ |
| A. | address, name |
| B. | address, location |
| C. | network, name |
| D. | network, location |
| Answer» B. address, location | |
| 17. |
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command? |
| A. | ftp |
| B. | rexec |
| C. | tcpexec |
| D. | telnet |
| Answer» D. telnet | |
| 18. |
TCP/IP is composed of _______ number of layers. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 19. |
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together. |
| A. | True |
| B. | False |
| Answer» B. False | |