InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the protocol is not used in the network layer of the TCP/IP model?(a) ICMP(b) IP(c) IGMP(d) HTTPThe question was asked in an interview.This intriguing question comes from Network Models topic in section Understanding Network Models for Security of Cyber Security |
|
Answer» Correct answer is (d) HTTP |
|
| 2. |
____________ protocol attack is done in the data-link layer.(a) HTTP(b) DNS(c) TCP/IP(d) POPI got this question in an internship interview.This intriguing question originated from Network Models in portion Understanding Network Models for Security of Cyber Security |
|
Answer» Correct option is (B) DNS |
|
| 3. |
Which 2 protocols are used in the Transport layer of the TCP/IP model?(a) UDP and HTTP(b) TCP and UDP(c) HTTP and TCP(d) ICMP and HTTPI got this question during an interview.This intriguing question comes from Network Models in portion Understanding Network Models for Security of Cyber Security |
|
Answer» The correct option is (B) TCP and UDP |
|
| 4. |
___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.(a) SYN flooding attack(b) ACK flooding attack(c) SYN & ACK flooding attack(d) Packet flooding attackI have been asked this question in class test.The origin of the question is Network Models topic in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» The CORRECT answer is (a) SYN flooding attack |
|
| 5. |
Which of them is not an attack done in the network layer of the TCP/IP model?(a) MITM attack(b) DoS attack(c) Spoofing attack(d) Shoulder surfingI got this question in an international level competition.This intriguing question originated from Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» Right choice is (d) Shoulder surfing |
|
| 6. |
Which of them is not an appropriate method of router security?(a) Unused ports should be blocked(b) Unused interfaces and services should be disabled(c) Routing protocol needs to be programmed by security experts(d) Packet filtering needs to be enabledThis question was posed to me during an internship interview.Asked question is from Network Models topic in section Understanding Network Models for Security of Cyber Security |
|
Answer» The correct choice is (C) Routing PROTOCOL needs to be programmed by security experts |
|
| 7. |
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.(a) TCP Spoofing(b) TCP Blind Spoofing(c) IP Spoofing(d) IP Blind SpoofingI got this question during an online exam.My doubt stems from Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» Right option is (B) TCP Blind SPOOFING |
|
| 8. |
There are __________ different versions of IP popularly used.(a) 2(b) 3(c) 4(d) 5I have been asked this question during a job interview.The query is from Network Models in portion Understanding Network Models for Security of Cyber Security |
|
Answer» CORRECT answer is (a) 2 Explanation: There are two DIFFERENT versions of IPs used popularly over the internet. These are IPv4 and IPV6. IPv4 is a 32-bits numeric ADDRESS written in decimal with 4 numbers separated by dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons. |
|
| 9. |
RoBOT is abbreviated as ___________(a) Return of Bleichenbacher’s Oracle Team(b) Rise of Bleichenbacher’s Oracle Threat(c) Return of Bleichenbacher’s Operational Threat(d) Return of Bleichenbacher’s Oracle ThreatI have been asked this question by my school teacher while I was bunking the class.Enquiry is from Network Models topic in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct choice is (d) Return of Bleichenbacher’s ORACLE THREAT |
|
| 10. |
TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.(a) True(b) FalseThe question was asked in quiz.This key question is from Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 11. |
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________(a) address, name(b) address, location(c) network, name(d) network, locationThe question was posed to me in a national level competition.This interesting question is from Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» The correct choice is (a) address, name |
|
| 12. |
Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).(a) True(b) FalseThis question was addressed to me in my homework.This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» Right choice is (a) True |
|
| 13. |
Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?(a) ftp(b) rexec(c) tcpexec(d) telnetI have been asked this question in unit test.The doubt is from Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» The correct answer is (C) tcpexec |
|
| 14. |
TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.(a) True(b) FalseThe question was asked by my school teacher while I was bunking the class.I would like to ask this question from Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» Correct choice is (a) True |
|
| 15. |
TCP/IP is composed of _______ number of layers.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in homework.This intriguing question comes from Network Models topic in portion Understanding Network Models for Security of Cyber Security |
|
Answer» Right option is (c) 4 |
|
| 16. |
Which of the following is an example of application layer vulnerability?(a) Cryptographic flaws lead to the privacy issue(b) Very complex application security controls(c) MAC Address Spoofing(d) Weak or non-existent authenticationI had been asked this question in an online interview.I'm obligated to ask this question of Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» The correct answer is (b) Very complex application security controls |
|
| 17. |
Which of the following is an example of presentation layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) highly complex application security controls(d) poor handling of unexpected inputThe question was asked during an online interview.Origin of the question is Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» Right choice is (d) poor handling of unexpected input |
|
| 18. |
Which of the following is an example of Transport layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) poor handling of unexpected input(d) highly complex application security controlsThe question was asked in homework.My question comes from Network Models topic in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct answer is (b) overloading of transport-LAYER mechanisms |
|
| 19. |
Which of the following is not an example of presentation layer issues?(a) Poor handling of unexpected input can lead to the execution of arbitrary instructions(b) Unintentional or ill-directed use of superficially supplied input(c) Cryptographic flaws in the system may get exploited to evade privacy(d) Weak or non-existent authentication mechanismsI got this question during an online exam.This interesting question is from Network Models topic in portion Understanding Network Models for Security of Cyber Security |
|
Answer» The CORRECT ANSWER is (d) Weak or non-existent authentication mechanisms |
|
| 20. |
Which of the following is an example of session layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) poor handling of unexpected input(d) highly complex application security controlsThe question was posed to me in a job interview.This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» Right choice is (a) weak or non-existent mechanisms for AUTHENTICATION |
|
| 21. |
Which of the following is not a vulnerability of the application layer?(a) Application design bugs may bypass security controls(b) Inadequate security controls force “all-or-nothing” approach(c) Logical bugs in programs may be by chance or on purpose be used for crashing programs(d) Overloading of transport-layer mechanismsI got this question by my school teacher while I was bunking the class.Question is from Network Models in portion Understanding Network Models for Security of Cyber Security |
|
Answer» Right answer is (d) Overloading of transport-layer mechanisms |
|
| 22. |
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.(a) True(b) FalseI have been asked this question in final exam.This question is from Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» RIGHT answer is (a) True Best explanation: Transmission mechanisms can be subject to SPOOFING & attacks based on skilled MODIFIED packets. This type of attacks is DONE in the transport LAYER of the OSI model. |
|
| 23. |
Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Route spoofing(c) Weak or non-existent authentication(d) Keystroke & Other Input LoggingThe question was posed to me in semester exam.My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct answer is (d) Keystroke & Other Input Logging |
|
| 24. |
Which of the following is not session layer vulnerability?(a) Mishandling of undefined, poorly defined(b) Spoofing and hijacking of data based on failed authentication attempts(c) Passing of session-credentials allowing intercept and unauthorized use(d) Weak or non-existent authentication mechanismsI have been asked this question in a national level competition.My question comes from Network Models in portion Understanding Network Models for Security of Cyber Security |
|
Answer» RIGHT answer is (a) Mishandling of undefined, poorly defined Explanation: Vulnerabilities of session LAYER of the OSI model are spoofing and hijacking of data based on failed AUTHENTICATION attempts, WEAK or non-existent authentication mechanisms, and the PASSING of session-credentials allowing intercept and unauthorized use. |
|
| 25. |
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?(a) Physical layer(b) Data-link Layer(c) Session layer(d) Presentation layerI got this question in an interview for job.The question is from Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» The CORRECT option is (c) Session layer |
|
| 26. |
Which of the following is not a transport layer vulnerability?(a) Mishandling of undefined, poorly defined(b) The Vulnerability that allows “fingerprinting” & other enumeration of host information(c) Overloading of transport-layer mechanisms(d) Unauthorized network accessI have been asked this question in homework.My doubt stems from Network Models topic in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Right ANSWER is (d) Unauthorized network access |
|
| 27. |
Which of the following is an example of data-link layer vulnerability?(a) Physical Theft of Data(b) VLAN circumvention(c) Route spoofing(d) Weak or non-existent authenticationI got this question in an interview for internship.My question is from Network Models in section Understanding Network Models for Security of Cyber Security |
| Answer» | |
| 28. |
Which of the following is an example of network layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationThis question was addressed to me by my school principal while I was bunking the class.My question is based upon Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» The correct option is (c) Route spoofing |
|
| 29. |
Which of the following is an example of data-link layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationThe question was asked in a national level competition.Origin of the question is Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» The CORRECT option is (a) MAC Address Spoofing |
|
| 30. |
Which of the following is not a vulnerability of the network layer?(a) Route spoofing(b) Identity & Resource ID Vulnerability(c) IP Address Spoofing(d) Weak or non-existent authenticationThis question was posed to me by my college professor while I was bunking the class.I need to ask this question from Network Models in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» CORRECT answer is (d) Weak or non-existent authentication Explanation: Weak or non-existent authentication is a VULNERABILITY of the session layer. Route spoofing, IDENTITY & resource ID vulnerability & IP ADDRESS Spoofing are examples of network layer vulnerability. |
|
| 31. |
Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationI have been asked this question at a job interview.Asked question is from Network Models in division Understanding Network Models for Security of Cyber Security |
| Answer» | |
| 32. |
________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.(a) Switches(b) Routers(c) Hubs(d) RepeatersThe question was asked in class test.This interesting question is from Network Models in section Understanding Network Models for Security of Cyber Security |
|
Answer» The CORRECT option is (a) Switches |
|
| 33. |
____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.(a) VLAN attack(b) VLAN Circumvention(c) VLAN compromisation method(d) Data-link evadingThis question was addressed to me in exam.Asked question is from Network Models topic in chapter Understanding Network Models for Security of Cyber Security |
|
Answer» Correct choice is (b) VLAN Circumvention |
|
| 34. |
Which of the following is not a vulnerability of the data-link layer?(a) MAC Address Spoofing(b) VLAN circumvention(c) Switches may be forced for flooding traffic to all VLAN ports(d) Overloading of transport-layer mechanismsThis question was posed to me in class test.Query is from Network Models in division Understanding Network Models for Security of Cyber Security |
|
Answer» Correct OPTION is (d) Overloading of transport-layer mechanisms |
|
| 35. |
In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.(a) physical(b) data-link(c) network(d) applicationI had been asked this question in an interview for job.Origin of the question is Network Models topic in division Understanding Network Models for Security of Cyber Security |
|
Answer» The correct CHOICE is (a) physical |
|
| 36. |
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.(a) True(b) FalseThis question was addressed to me during an interview.This is a very interesting question from Network Models topic in portion Understanding Network Models for Security of Cyber Security |
|
Answer» RIGHT option is (a) True Explanation: LOSS of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. Other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & Other INPUT Logging. |
|
| 37. |
Which of the following is not physical layer vulnerability?(a) Physical theft of data & hardware(b) Physical damage or destruction of data & hardware(c) Unauthorized network access(d) Keystroke & Other Input LoggingI had been asked this question at a job interview.My enquiry is from Network Models in division Understanding Network Models for Security of Cyber Security |
|
Answer» Right choice is (c) Unauthorized NETWORK access |
|
| 38. |
The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.(a) TCP/IP(b) Cloud(c) OSI(d) OISThis question was posed to me in an internship interview.The query is from Network Models in division Understanding Network Models for Security of Cyber Security |
|
Answer» Correct CHOICE is (c) OSI |
|
| 39. |
The full form of OSI is OSI model is ______________(a) Open Systems Interconnection(b) Open Software Interconnection(c) Open Systems Internet(d) Open Software InternetI got this question by my school principal while I was bunking the class.This interesting question is from Network Models topic in section Understanding Network Models for Security of Cyber Security |
|
Answer» Correct OPTION is (a) Open Systems Interconnection |
|