50+ Network Models and Security MCQ Questions part-1

In this MCQ, we will explore the different types of network models and security mechanisms. We will learn about the different types of attacks that can be launched against a network and the different ways to protect against them. We will also learn about the different types of network architectures and how they can be used to secure a network.

Que.The ____________ model is 7-layer architecture where each layer is having some specific functionality to perform.
a. TCP/IP
b. Cloud
c. OSI
d. OIS
Que.The full form of OSI is OSI model is ______________
a. Open Systems Interconnection
b. Open Software Interconnection
c. Open Systems Internet
d. Open Software Internet
Que.Which of the following is not physical layer vulnerability?
a. Physical theft of data & hardware
b. Physical damage or destruction of data & hardware
c. Unauthorized network access
d. Keystroke & Other Input Logging
Que.In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.
a. physical
b. data-link
c. network
d. application
Que.Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not a vulnerability of the data-link layer?
a. MAC Address Spoofing
b. VLAN circumvention
c. Switches may be forced for flooding traffic to all VLAN ports
d. Overloading of transport-layer mechanisms
Que.____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
a. VLAN attack
b. VLAN Circumvention
c. VLAN compromisation method
d. Data-link evading
Que.________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
a. Switches
b. Routers
c. Hubs
d. Repeaters
Que.Which of the following is not a vulnerability of the network layer?
a. Route spoofing
b. Identity & Resource ID Vulnerability
c. IP Address Spoofing
d. Weak or non-existent authentication
Que.Which of the following is an example of physical layer vulnerability?
a. MAC Address Spoofing
b. Physical Theft of Data
c. Route spoofing
d. Weak or non-existent authentication