

MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of them is not an attack done in the network layer of the TCP/IP model? |
A. | MITM attack |
B. | DoS attack |
C. | Spoofing attack |
D. | Shoulder surfing |
Answer» E. | |
2. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. |
A. | SYN flooding attack |
B. | ACK flooding attack |
C. | SYN & ACK flooding attack |
D. | Packet flooding attack |
Answer» B. ACK flooding attack | |
3. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number. |
A. | TCP Spoofing |
B. | TCP Blind Spoofing |
C. | IP Spoofing |
D. | IP Blind Spoofing |
Answer» C. IP Spoofing | |
4. |
There are __________ different versions of IP popularly used. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
5. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat. |
A. | True |
B. | False |
Answer» B. False | |
6. |
_____________IS_AN_ATTACK_WHERE_THE_ATTACKER_IS_ABLE_TO_GUESS_TOGETHER_WITH_THE_SEQUENCE_NUMBER_OF_AN_IN_PROGRESS_COMMUNICATION_SESSION_&_THE_PORT_NUMBER.?$ |
A. | TCP Spoofing |
B. | TCP Blind Spoofing |
C. | IP Spoofing |
D. | IP Blind Spoofing |
Answer» C. IP Spoofing | |
7. |
Which of them is not an attack done in the network layer of the TCP/IP model?$ |
A. | MITM attack |
B. | DoS attack |
C. | Spoofing attack |
D. | Shoulder surfing |
Answer» E. | |
8. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.$ |
A. | SYN flooding attack |
B. | ACK flooding attack |
C. | SYN & ACK flooding attack |
D. | Packet flooding attack |
Answer» B. ACK flooding attack | |
9. |
____________ protocol attack is done in the data-link layer. |
A. | HTTP |
B. | DNS |
C. | TCP/IP |
D. | POP |
Answer» C. TCP/IP | |
10. |
Which of the protocol is not used in the network layer of the TCP/IP model? |
A. | ICMP |
B. | IP |
C. | IGMP |
D. | HTTP |
Answer» E. | |
11. |
Which 2 protocols are used in the Transport layer of the TCP/IP model? |
A. | UDP and HTTP |
B. | TCP and UDP |
C. | HTTP and TCP |
D. | ICMP and HTTP |
Answer» C. HTTP and TCP | |
12. |
Which of them is not an appropriate method of router security? |
A. | Unused ports should be blocked |
B. | Unused interfaces and services should be disabled |
C. | Routing protocol needs to be programmed by security experts |
D. | Packet filtering needs to be enabled |
Answer» D. Packet filtering needs to be enabled | |
13. |
RoBOT is abbreviated as ___________ |
A. | Return of Bleichenbacher’s Oracle Team |
B. | Rise of Bleichenbacher’s Oracle Threat |
C. | Return of Bleichenbacher’s Operational Threat |
D. | Return of Bleichenbacher’s Oracle Threat |
Answer» E. | |
14. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat$ |
A. | True |
B. | False |
Answer» B. False | |
15. |
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). |
A. | True |
B. | False |
Answer» B. False | |
16. |
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________ |
A. | address, name |
B. | address, location |
C. | network, name |
D. | network, location |
Answer» B. address, location | |
17. |
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command? |
A. | ftp |
B. | rexec |
C. | tcpexec |
D. | telnet |
Answer» D. telnet | |
18. |
TCP/IP is composed of _______ number of layers. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
19. |
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together. |
A. | True |
B. | False |
Answer» B. False | |