Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the protocol is not used in the network layer of the TCP/IP model?(a) ICMP(b) IP(c) IGMP(d) HTTPThe question was asked in an interview.This intriguing question comes from Network Models topic in section Understanding Network Models for Security of Cyber Security

Answer»

Correct answer is (d) HTTP

To elaborate: Internet Control MESSAGE Protocol (ICMP), Internet Protocol (IP) and Internet Group Management Protocol (IGMP) are used in the network LAYER. HTTP is used in APPLICATION layer of TCP/IP model.

2.

____________ protocol attack is done in the data-link layer.(a) HTTP(b) DNS(c) TCP/IP(d) POPI got this question in an internship interview.This intriguing question originated from Network Models in portion Understanding Network Models for Security of Cyber Security

Answer»

Correct option is (B) DNS

The EXPLANATION: DNS protocol attack is DONE in the APPLICATION layer of the TCP/IP model which allows attackers to modify DNS records in order to misdirect user traffic and land them in some malicious or spoofed address.

3.

Which 2 protocols are used in the Transport layer of the TCP/IP model?(a) UDP and HTTP(b) TCP and UDP(c) HTTP and TCP(d) ICMP and HTTPI got this question during an interview.This intriguing question comes from Network Models in portion Understanding Network Models for Security of Cyber Security

Answer»

The correct option is (B) TCP and UDP

Easiest EXPLANATION: The transport layer can VOLUNTARILY declare the consistency of communications.Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common transport layer protocols.

4.

___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.(a) SYN flooding attack(b) ACK flooding attack(c) SYN & ACK flooding attack(d) Packet flooding attackI have been asked this question in class test.The origin of the question is Network Models topic in chapter Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT answer is (a) SYN flooding attack

The best I can explain: SYN flooding attack is an attack TECHNIQUE where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. The SYN & ACK SEGMENTS NEED to begin in a TCP connection.

5.

Which of them is not an attack done in the network layer of the TCP/IP model?(a) MITM attack(b) DoS attack(c) Spoofing attack(d) Shoulder surfingI got this question in an international level competition.This intriguing question originated from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (d) Shoulder surfing

Explanation: MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer of the TCP/IP model. It is important to secure the network layer as it is the only means to MAKE CERTAIN that your APPLICATION is not GETTING FLOODED with attacks.

6.

Which of them is not an appropriate method of router security?(a) Unused ports should be blocked(b) Unused interfaces and services should be disabled(c) Routing protocol needs to be programmed by security experts(d) Packet filtering needs to be enabledThis question was posed to me during an internship interview.Asked question is from Network Models topic in section Understanding Network Models for Security of Cyber Security

Answer»

The correct choice is (C) Routing PROTOCOL needs to be programmed by security experts

The explanation is: Unused ports should be BLOCKED, Unused interfaces and services should be DISABLED, and Packet filtering needs to be enabled are some of the security measures that need to be taken for the ROUTERS.

7.

____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.(a) TCP Spoofing(b) TCP Blind Spoofing(c) IP Spoofing(d) IP Blind SpoofingI got this question during an online exam.My doubt stems from Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

Right option is (B) TCP Blind SPOOFING

The best explanation: TCP Blind Spoofing is an attack where the attacker is ABLE to guess TOGETHER with the sequence number of an in progress COMMUNICATION session & the port number.

8.

There are __________ different versions of IP popularly used.(a) 2(b) 3(c) 4(d) 5I have been asked this question during a job interview.The query is from Network Models in portion Understanding Network Models for Security of Cyber Security

Answer» CORRECT answer is (a) 2

Explanation: There are two DIFFERENT versions of IPs used popularly over the internet. These are IPv4 and IPV6. IPv4 is a 32-bits numeric ADDRESS written in decimal with 4 numbers separated by dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.
9.

RoBOT is abbreviated as ___________(a) Return of Bleichenbacher’s Oracle Team(b) Rise of Bleichenbacher’s Oracle Threat(c) Return of Bleichenbacher’s Operational Threat(d) Return of Bleichenbacher’s Oracle ThreatI have been asked this question by my school teacher while I was bunking the class.Enquiry is from Network Models topic in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct choice is (d) Return of Bleichenbacher’s ORACLE THREAT

To explain I would say: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that ALLOWS an ATTACKER to get hold of the RSA key essential to decrypt TLS traffic below CERTAIN conditions.

10.

TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.(a) True(b) FalseThe question was asked in quiz.This key question is from Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct choice is (a) True

Best explanation: Return of Bleichenbacher’s Oracle THREAT is a transport layer vulnerability that ALLOWS an attacker to GET hold of the RSA key essential to decrypt TLS traffic below certain conditions.

11.

Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________(a) address, name(b) address, location(c) network, name(d) network, locationThe question was posed to me in a national level competition.This interesting question is from Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

The correct choice is (a) address, name

For explanation: Connection AUTHENTICATION is OFFERED for ensuring that the remote HOST has the likely Internet PROTOCOL (IP)’s address & name. This AVOIDS a remote host to masquerade as an added remote host.

12.

Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).(a) True(b) FalseThis question was addressed to me in my homework.This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (a) True

The best I can explain: APPLICATION layer sends & receives data for particular APPLICATIONS using HyperText Transfer Protocol (HTTP), and SIMPLE Mail Transfer Protocol (SMTP). Hence, data encryption for HTTP and SMTP is IMPORTANT.

13.

Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?(a) ftp(b) rexec(c) tcpexec(d) telnetI have been asked this question in unit test.The doubt is from Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer»

The correct answer is (C) tcpexec

Easy explanation: Trusted TCP/IP commands such as ftp, rexec and TELNET have the same needs & go through the identical verification PROCESS. INTERNET & TCP/IP are often implemented SYNONYMOUSLY.

14.

TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.(a) True(b) FalseThe question was asked by my school teacher while I was bunking the class.I would like to ask this question from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

Correct choice is (a) True

Best explanation: TCP/IP is EXTENSIVELY used model for the WORLD Wide WEB for providing network communications which are composed of 4 layers that work together. Each layer is composed of header and payload.

15.

TCP/IP is composed of _______ number of layers.(a) 2(b) 3(c) 4(d) 5This question was addressed to me in homework.This intriguing question comes from Network Models topic in portion Understanding Network Models for Security of Cyber Security

Answer»

Right option is (c) 4

For explanation: TCP/IP is EXTENSIVELY USED model for the World Wide Web for providing network COMMUNICATIONS which are composed of 4 layers that work together. Each LAYER is composed of HEADER and payload.

16.

Which of the following is an example of application layer vulnerability?(a) Cryptographic flaws lead to the privacy issue(b) Very complex application security controls(c) MAC Address Spoofing(d) Weak or non-existent authenticationI had been asked this question in an online interview.I'm obligated to ask this question of Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer»

The correct answer is (b) Very complex application security controls

Easiest explanation: Very complex application security controls can be an example of application layer vulnerability. Inadequate security controls, as WELL as LOGICAL bugs in PROGRAMS, are some other examples of such TYPE.

17.

Which of the following is an example of presentation layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) highly complex application security controls(d) poor handling of unexpected inputThe question was asked during an online interview.Origin of the question is Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (d) poor handling of unexpected input

For explanation: Poor handling of unexpected input is an EXAMPLE of presentation LAYER VULNERABILITY. Cryptographic FLAWS may be exploited to circumvent privacy, unintentional use of superficially SUPPLIED input are some other examples of presentation layer vulnerability.

18.

Which of the following is an example of Transport layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) poor handling of unexpected input(d) highly complex application security controlsThe question was asked in homework.My question comes from Network Models topic in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct answer is (b) overloading of transport-LAYER mechanisms

Best explanation: Overloading of transport-layer mechanisms is an EXAMPLE of transport layer vulnerability. Other EXAMPLES of Transport layer vulnerability are mishandling of undefined, poorly DEFINED, Vulnerability that allows “fingerprinting” & other enumeration of host information.

19.

Which of the following is not an example of presentation layer issues?(a) Poor handling of unexpected input can lead to the execution of arbitrary instructions(b) Unintentional or ill-directed use of superficially supplied input(c) Cryptographic flaws in the system may get exploited to evade privacy(d) Weak or non-existent authentication mechanismsI got this question during an online exam.This interesting question is from Network Models topic in portion Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT ANSWER is (d) Weak or non-existent authentication mechanisms

For explanation I would say: Cryptographic flaws may be exploited to circumvent privacy, unintentional or ill-directed use of superficially supplied INPUT, and poor handling of UNEXPECTED input are examples of presentation LAYER flaws.

20.

Which of the following is an example of session layer vulnerability?(a) weak or non-existent mechanisms for authentication(b) overloading of transport-layer mechanisms(c) poor handling of unexpected input(d) highly complex application security controlsThe question was posed to me in a job interview.This intriguing question comes from Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (a) weak or non-existent mechanisms for AUTHENTICATION

For explanation: Weak or non-existent mechanisms for authentication is an example of session layer vulnerability. Other EXAMPLES are SPOOFING and the HIJACKING of data based on failed-authentication attempts & passing of session-credentials allowing intercept and unauthorized USE.

21.

Which of the following is not a vulnerability of the application layer?(a) Application design bugs may bypass security controls(b) Inadequate security controls force “all-or-nothing” approach(c) Logical bugs in programs may be by chance or on purpose be used for crashing programs(d) Overloading of transport-layer mechanismsI got this question by my school teacher while I was bunking the class.Question is from Network Models in portion Understanding Network Models for Security of Cyber Security

Answer»

Right answer is (d) Overloading of transport-layer mechanisms

The best I can EXPLAIN: APPLICATION design flaws may bypass security controls, inadequate security controls as well as logical bugs in programs may be by chance or on purpose be used for CRASHING programs. These all are part of application layer vulnerability.

22.

Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.(a) True(b) FalseI have been asked this question in final exam.This question is from Network Models in section Understanding Network Models for Security of Cyber Security

Answer» RIGHT answer is (a) True

Best explanation: Transmission mechanisms can be subject to SPOOFING & attacks based on skilled MODIFIED packets. This type of attacks is DONE in the transport LAYER of the OSI model.
23.

Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Route spoofing(c) Weak or non-existent authentication(d) Keystroke & Other Input LoggingThe question was posed to me in semester exam.My question is from Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct answer is (d) Keystroke & Other Input Logging

To elaborate: Keystroke & other input logging is an example of physical LAYER VULNERABILITY. Other such physical layer vulnerabilities are unauthorized NETWORK access, DAMAGE or destruction of data & hardware and keystroke & Other Input Logging.

24.

Which of the following is not session layer vulnerability?(a) Mishandling of undefined, poorly defined(b) Spoofing and hijacking of data based on failed authentication attempts(c) Passing of session-credentials allowing intercept and unauthorized use(d) Weak or non-existent authentication mechanismsI have been asked this question in a national level competition.My question comes from Network Models in portion Understanding Network Models for Security of Cyber Security

Answer» RIGHT answer is (a) Mishandling of undefined, poorly defined

Explanation: Vulnerabilities of session LAYER of the OSI model are spoofing and hijacking of data based on failed AUTHENTICATION attempts, WEAK or non-existent authentication mechanisms, and the PASSING of session-credentials allowing intercept and unauthorized use.
25.

Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?(a) Physical layer(b) Data-link Layer(c) Session layer(d) Presentation layerI got this question in an interview for job.The question is from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT option is (c) Session layer

For EXPLANATION: Session identification MAY be subject to spoofing may lead to data leakage which depends on failed authentication attempts and allow hackers to allow brute-force attacks on ACCESS credentials.

26.

Which of the following is not a transport layer vulnerability?(a) Mishandling of undefined, poorly defined(b) The Vulnerability that allows “fingerprinting” & other enumeration of host information(c) Overloading of transport-layer mechanisms(d) Unauthorized network accessI have been asked this question in homework.My doubt stems from Network Models topic in chapter Understanding Network Models for Security of Cyber Security

Answer»

Right ANSWER is (d) Unauthorized network access

For explanation I would say: The different vulnerabilities of the Transport LAYER are mishandling of UNDEFINED, poorly defined, Vulnerability that allow “fingerprinting” & other enumeration of host information, Overloading of transport-layer mechanisms ETC. Unauthorized network access is an example of physical layer vulnerability.

27.

Which of the following is an example of data-link layer vulnerability?(a) Physical Theft of Data(b) VLAN circumvention(c) Route spoofing(d) Weak or non-existent authenticationI got this question in an interview for internship.My question is from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»
28.

Which of the following is an example of network layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationThis question was addressed to me by my school principal while I was bunking the class.My question is based upon Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

The correct option is (c) Route spoofing

The BEST I can explain: Route spoofing is an example of network LAYER vulnerability. Other examples of network layer vulnerabilities are IP Address Spoofing and IDENTITY & RESOURCE ID Vulnerability.

29.

Which of the following is an example of data-link layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationThe question was asked in a national level competition.Origin of the question is Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT option is (a) MAC Address Spoofing

The best I can explain: MAC Address spoofing is an example of data-link layer vulnerability.VLAN circumvention, as WELL as SWITCHES, may be FORCED for flooding traffic to all VLAN ports are some other examples of data-link layer vulnerability.

30.

Which of the following is not a vulnerability of the network layer?(a) Route spoofing(b) Identity & Resource ID Vulnerability(c) IP Address Spoofing(d) Weak or non-existent authenticationThis question was posed to me by my college professor while I was bunking the class.I need to ask this question from Network Models in chapter Understanding Network Models for Security of Cyber Security

Answer» CORRECT answer is (d) Weak or non-existent authentication

Explanation: Weak or non-existent authentication is a VULNERABILITY of the session layer. Route spoofing, IDENTITY & resource ID vulnerability & IP ADDRESS Spoofing are examples of network layer vulnerability.
31.

Which of the following is an example of physical layer vulnerability?(a) MAC Address Spoofing(b) Physical Theft of Data(c) Route spoofing(d) Weak or non-existent authenticationI have been asked this question at a job interview.Asked question is from Network Models in division Understanding Network Models for Security of Cyber Security

Answer»
32.

________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.(a) Switches(b) Routers(c) Hubs(d) RepeatersThe question was asked in class test.This interesting question is from Network Models in section Understanding Network Models for Security of Cyber Security

Answer»

The CORRECT option is (a) Switches

The explanation is: Switches MAY be forced for flooding traffic to all VLAN PORTS ALLOWING interception of data through any DEVICE that are connected to a VLAN. It is a vulnerability of data link layer.

33.

____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.(a) VLAN attack(b) VLAN Circumvention(c) VLAN compromisation method(d) Data-link evadingThis question was addressed to me in exam.Asked question is from Network Models topic in chapter Understanding Network Models for Security of Cyber Security

Answer»

Correct choice is (b) VLAN Circumvention

For EXPLANATION: VLAN Circumvention is data-link layer vulnerability where STATIONS are forced to make DIRECT communication with another station by EVADING logical controls implemented using subnets and firewalls.

34.

Which of the following is not a vulnerability of the data-link layer?(a) MAC Address Spoofing(b) VLAN circumvention(c) Switches may be forced for flooding traffic to all VLAN ports(d) Overloading of transport-layer mechanismsThis question was posed to me in class test.Query is from Network Models in division Understanding Network Models for Security of Cyber Security

Answer»

Correct OPTION is (d) Overloading of transport-layer mechanisms

For explanation: MAC Address Spoofing, VLAN CIRCUMVENTION and switches MAY be forced for flooding traffic to all VLAN PORTS are EXAMPLES of data-link layer vulnerability.

35.

In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.(a) physical(b) data-link(c) network(d) applicationI had been asked this question in an interview for job.Origin of the question is Network Models topic in division Understanding Network Models for Security of Cyber Security

Answer»

The correct CHOICE is (a) physical

Explanation: In the physical LAYER, vulnerabilities are directly associated with physical ACCESS to networks and hardware such as unauthorised network access, damage or destruction of data & hardware and KEYSTROKE & Other Input Logging.

36.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.(a) True(b) FalseThis question was addressed to me during an interview.This is a very interesting question from Network Models topic in portion Understanding Network Models for Security of Cyber Security

Answer» RIGHT option is (a) True

Explanation: LOSS of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. Other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & Other INPUT Logging.
37.

Which of the following is not physical layer vulnerability?(a) Physical theft of data & hardware(b) Physical damage or destruction of data & hardware(c) Unauthorized network access(d) Keystroke & Other Input LoggingI had been asked this question at a job interview.My enquiry is from Network Models in division Understanding Network Models for Security of Cyber Security

Answer»

Right choice is (c) Unauthorized NETWORK access

The EXPLANATION: Unauthorized network access is not an example of physical layer vulnerability. The rest three – Physical theft of DATA & hardware, damage or destruction of data & hardware and keystroke & Other INPUT LOGGING are physical layer vulnerabilities.

38.

The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.(a) TCP/IP(b) Cloud(c) OSI(d) OISThis question was posed to me in an internship interview.The query is from Network Models in division Understanding Network Models for Security of Cyber Security

Answer»

Correct CHOICE is (c) OSI

For EXPLANATION I would say: The OSI model is 7-layer ARCHITECTURE where each layer is having some SPECIFIC FUNCTIONALITY to perform. All these layers work in collaboration for transmitting the data from 1 person to another worldwide.

39.

The full form of OSI is OSI model is ______________(a) Open Systems Interconnection(b) Open Software Interconnection(c) Open Systems Internet(d) Open Software InternetI got this question by my school principal while I was bunking the class.This interesting question is from Network Models topic in section Understanding Network Models for Security of Cyber Security

Answer»

Correct OPTION is (a) Open Systems Interconnection

Easiest explanation: The OSI model is 7-LAYER architecture where each layer is having some specific functionality to perform. All these layers work in collaboration for transmitting the DATA from 1 person to another worldwide.