Understanding Network Models for Security: How different Network Models have been Designed for Security

This is a computer science engineering quiz on cybersecurity, which includes questions on network models for security.

images.jpg
Start Quiz

TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

True False

TCP/IP is composed of _______ number of layers.

2 3 4 5

TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

True False

The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.

TCP/IP Cloud OSI OIS

The full form of OSI is OSI model is ______________

Open Systems Interconnection Open Software Interconnection Open Systems Internet Open Software Internet

Which of the following is not physical layer vulnerability?

Physical theft of data & hardware Physical damage or destruction of data & hardware Unauthorized network access Keystroke & Other Input Logging

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

True False

Which of the following is not a vulnerability of the data-link layer?

MAC Address Spoofing VLAN circumvention Switches may be forced for flooding traffic to all VLAN ports Overloading of transport-layer mechanisms

____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

VLAN attack VLAN Circumvention VLAN compromisation method Data-link evading

________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

Switches Routers Hubs Repeaters

Which of the following is not a vulnerability of the network layer?

Route spoofing Identity & Resource ID Vulnerability IP Address Spoofing Weak or non-existent authentication

Which of the following is an example of physical layer vulnerability?

MAC Address Spoofing Physical Theft of Data Route spoofing Weak or non-existent authentication

Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

ftp

rexec

tcpexec

telnet

Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ and _________

Address, name

Address, location

Network, name

Network, location

In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.

Physical

Data-link

Network

Application

Quiz/Test Summary
Title: Understanding Network Models for Security: How different Network Models have been Designed for Security
Questions: 15
Contributed by:
james