Home » Cyber Security » Network Models and Security
In this MCQ, we will explore the different types of network models and security mechanisms. We will learn about the different types of attacks that can be launched against a network and the different ways to protect against them. We will also learn about the different types of network architectures and how they can be used to secure a network.
Que.Which of the following is an example of data-link layer vulnerability? a. MAC Address Spoofing b. Physical Theft of Data c. Route spoofing d. Weak or non-existent authentication
Que.Which of the following is an example of network layer vulnerability? a. MAC Address Spoofing b. Physical Theft of Data c. Route spoofing d. Weak or non-existent authentication
Que.Which of the following is not a transport layer vulnerability? a. Mishandling of undefined, poorly defined b. The Vulnerability that allows “fingerprinting” & other enumeration of host information c. Overloading of transport-layer mechanisms d. Unauthorized network access
Show Answer Unauthorized network access
Que.Which of the following is not session layer vulnerability? a. Mishandling of undefined, poorly defined b. Spoofing and hijacking of data based on failed authentication attempts c. Passing of session-credentials allowing intercept and unauthorized use d. Weak or non-existent authentication mechanisms
Show Answer Mishandling of undefined, poorly defined
Que.Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model? a. Physical layer b. Data-link Layer c. Session layer d. Presentation layer
Que.Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets. a. True b. False c. May be True or False d. Can’t say
Que.Which of the following is not an example of presentation layer issues? a. Poor handling of unexpected input can lead to the execution of arbitrary instructions b. Unintentional or ill-directed use of superficially supplied input c. Cryptographic flaws in the system may get exploited to evade privacy d. Weak or non-existent authentication mechanisms
Show Answer Weak or non-existent authentication mechanisms
Que.Which of the following is not a vulnerability of the application layer? a. Application design bugs may bypass security controls b. Inadequate security controls force “all-or-nothing” approach c. Logical bugs in programs may be by chance or on purpose be used for crashing programs d. Overloading of transport-layer mechanisms
Show Answer Overloading of transport-layer mechanisms
Que.Which of the following is an example of Transport layer vulnerability? a. weak or non-existent mechanisms for authentication b. overloading of transport-layer mechanisms c. poor handling of unexpected input d. highly complex application security controls
Show Answer overloading of transport-layer mechanisms
Que.Which of the following is an example of session layer vulnerability? a. weak or non-existent mechanisms for authentication b. overloading of transport-layer mechanisms c. poor handling of unexpected input d. highly complex application security controls
Show Answer weak or non-existent mechanisms for authentication