50+ Network Models and Security MCQ Questions part-4

In this MCQ, we will explore the different types of network models and security mechanisms. We will learn about the different types of attacks that can be launched against a network and the different ways to protect against them. We will also learn about the different types of network architectures and how they can be used to secure a network.

Que.____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.
a. TCP Spoofing
b. TCP Blind Spoofing
c. IP Spoofing
d. IP Blind Spoofing
Que.___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.
a. SYN flooding attack
b. ACK flooding attack
c. SYN & ACK flooding attack
d. Packet flooding attack
Que.Which of them is not an attack done in the network layer of the TCP/IP model?
a. MITM attack
b. DoS attack
c. Spoofing attack
d. Shoulder surfing
Que.Which of them is not an appropriate method of router security?
a. Unused ports should be blocked
b. Unused interfaces and services should be disabled
c. Routing protocol needs to be programmed by security experts
d. Packet filtering needs to be enabled
Que.Which 2 protocols are used in the Transport layer of the TCP/IP model?
a. UDP and HTTP
b. TCP and UDP
c. HTTP and TCP
d. ICMP and HTTP
Que.Which of the protocol is not used in the network layer of the TCP/IP model?
a. ICMP
b. IP
c. IGMP
d. HTTP
Que.____________ protocol attack is done in the data-link layer.
a. HTTP
b. DNS
c. TCP/IP
d. POP

Get code60