This is a computer science engineering quiz on cybersecurity, which includes questions on network models for security.
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
TCP/IP is composed of _______ number of layers.
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.
The full form of OSI is OSI model is ______________
Which of the following is not physical layer vulnerability?
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
Which of the following is not a vulnerability of the data-link layer?
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
Which of the following is not a vulnerability of the network layer?
Which of the following is an example of physical layer vulnerability?
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?
ftp
rexec
tcpexec
telnet
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ and _________
Address, name
Address, location
Network, name
Network, location
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
Physical
Data-link
Network
Application