Explore topic-wise MCQs in Cyber Security.

This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of them is not an attack done in the network layer of the TCP/IP model?

A. MITM attack
B. DoS attack
C. Spoofing attack
D. Shoulder surfing
Answer» E.
2.

___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

A. SYN flooding attack
B. ACK flooding attack
C. SYN & ACK flooding attack
D. Packet flooding attack
Answer» B. ACK flooding attack
3.

____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

A. TCP Spoofing
B. TCP Blind Spoofing
C. IP Spoofing
D. IP Blind Spoofing
Answer» C. IP Spoofing
4.

There are __________ different versions of IP popularly used.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
5.

TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

A. True
B. False
Answer» B. False
6.

_____________IS_AN_ATTACK_WHERE_THE_ATTACKER_IS_ABLE_TO_GUESS_TOGETHER_WITH_THE_SEQUENCE_NUMBER_OF_AN_IN_PROGRESS_COMMUNICATION_SESSION_&_THE_PORT_NUMBER.?$

A. TCP Spoofing
B. TCP Blind Spoofing
C. IP Spoofing
D. IP Blind Spoofing
Answer» C. IP Spoofing
7.

Which of them is not an attack done in the network layer of the TCP/IP model?$

A. MITM attack
B. DoS attack
C. Spoofing attack
D. Shoulder surfing
Answer» E.
8.

___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.$

A. SYN flooding attack
B. ACK flooding attack
C. SYN & ACK flooding attack
D. Packet flooding attack
Answer» B. ACK flooding attack
9.

____________ protocol attack is done in the data-link layer.

A. HTTP
B. DNS
C. TCP/IP
D. POP
Answer» C. TCP/IP
10.

Which of the protocol is not used in the network layer of the TCP/IP model?

A. ICMP
B. IP
C. IGMP
D. HTTP
Answer» E.
11.

Which 2 protocols are used in the Transport layer of the TCP/IP model?

A. UDP and HTTP
B. TCP and UDP
C. HTTP and TCP
D. ICMP and HTTP
Answer» C. HTTP and TCP
12.

Which of them is not an appropriate method of router security?

A. Unused ports should be blocked
B. Unused interfaces and services should be disabled
C. Routing protocol needs to be programmed by security experts
D. Packet filtering needs to be enabled
Answer» D. Packet filtering needs to be enabled
13.

RoBOT is abbreviated as ___________

A. Return of Bleichenbacher’s Oracle Team
B. Rise of Bleichenbacher’s Oracle Threat
C. Return of Bleichenbacher’s Operational Threat
D. Return of Bleichenbacher’s Oracle Threat
Answer» E.
14.

TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat$

A. True
B. False
Answer» B. False
15.

Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

A. True
B. False
Answer» B. False
16.

Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________

A. address, name
B. address, location
C. network, name
D. network, location
Answer» B. address, location
17.

Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

A. ftp
B. rexec
C. tcpexec
D. telnet
Answer» D. telnet
18.

TCP/IP is composed of _______ number of layers.

A. 2
B. 3
C. 4
D. 5
Answer» D. 5
19.

TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

A. True
B. False
Answer» B. False