logo
  • Home
  • Rank
  • Tests
  • About
  • Training
  • Programming
  • CS
  • IT
  • IS
  • ECE
  • EEE
  • EE
  • Civil
  • Mechanical
  • Chemical
  • Metallurgy
  • Instrumentation
  • Aeronautical
  • Aerospace
  • Biotechnology
  • Agriculture
  • MCA
  • BCA
  • Internship
  • Contact

Cyber Security Multiple Choice Questions | MCQs | Quiz

Cyber Security Interview Questions and Answers
Practice Cyber Security questions and answers for interviews, campus placements, online tests, aptitude tests, quizzes and competitive exams.

Get Started

•   Hacking History
•   Hackers Types
•   Cyber Attacks Types
•   Security Elements
•   Security Technologies
•   Generic Security Steps - 1
•   Generic Security Steps - 2
•   Physical Hacking
•   Security Protocols - 1
•   Security Protocols - 2
•   Hacking Terminologies - 1
•   Hacking Terminologies - 2
•   Ports & Its Types - 1
•   Ports & Its Types - 2
•   Firewalls - 1
•   Firewalls - 2
•   VPNs
•   Linux OS & Its Security
•   Buffer Overflow - 1
•   Buffer Overflow - 2
•   Enumerating-Cyber Security
•   Hacking & Security Skills
•   Fingerprinting
•   Exploits & Exploitation
•   Cyber & IT laws - 1
•   Cyber & IT laws - 2
•   Security Tools - 1
•   Security Tools - 2
•   Bugs & Vulnerabilities
•   Ethical Hacking Ethics
•   Security Breach
•   Corporate Cyber Security
•   OSI Model Security - 1
•   OSI Model Security - 2
•   TCP-IP Model Security
•   Data Leakage - 1
•   Data Leakage - 2
•   Information Techniques - 1
•   Information Techniques - 2
•   Security Scanning Phase-1
•   Security Scanning Phase-2
•   Email Security - 1
•   Email Security - 2
•   Password Cracking - 1
•   Password Cracking - 2
•   Windows Security
•   Mobile Phone Security
•   Wireless Security
•   Virus & Worms
•   Trojans & Backdoors - 1
•   Trojans & Backdoors - 2
•   Botnets
•   Digital Privacy
•   DoS & DDoS
•   Phishing & Its Types
•   Sniffing
•   Session Hijacking
•   Web Server Attacks
•   Application Vulnerabilities
•   Adwares
•   Spywares
•   Reverse Engineering - 1
•   Reverse Engineering - 2
•   DNS Hacking & Security
•   Caches & Cookies
•   Social Networking Security
•   Spamming
•   Cryptography Types - 1
•   Cryptography Types - 2
•   Ciphers & Its Security
•   Steganography Security
•   Tor Services
•   Anonymity & Pseudonymity
•   Deep Web & Darknet

« Prev Page
Next Page »

Cyber Security Questions and Answers – TCP-IP Model Security

Posted on February 11, 2019 by Manish

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “TCP-IP Model Security”.

1. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.
a) True
b) False
View Answer

Answer: a
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together. Each layer is composed of header and payload.
advertisement

2. TCP/IP is composed of _______ number of layers.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: c
Explanation: TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together. Each layer is composed of header and payload.

3. Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?
a) ftp
b) rexec
c) tcpexec
d) telnet
View Answer

Answer: c
Explanation: Trusted TCP/IP commands such as ftp, rexec and telnet have the same needs & go through the identical verification process. Internet & TCP/IP are often implemented synonymously.

4. Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________
a) address, name
b) address, location
c) network, name
d) network, location
View Answer

Answer: a
Explanation: Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added remote host.

5. Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).
a) True
b) False
View Answer

Answer: a
Explanation: Application layer sends & receives data for particular applications using HyperText Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). Hence, data encryption for HTTP and SMTP is important.

6. TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat
a) True
b) False
View Answer

Answer: a
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.
advertisement

7. RoBOT is abbreviated as ___________
a) Return of Bleichenbacher’s Oracle Team
b) Rise of Bleichenbacher’s Oracle Threat
c) Return of Bleichenbacher’s Operational Threat
d) Return of Bleichenbacher’s Oracle Threat
View Answer

Answer: d
Explanation: Return of Bleichenbacher’s Oracle Threat is a transport layer vulnerability that allows an attacker to get hold of the RSA key essential to decrypt TLS traffic below certain conditions.

8. There are __________ different versions of IP popularly used.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: 2
Explanation: There are two different versions of IPs used popularly over the internet. These are IPv4 and IPv6. IPv4 is a 32-bits numeric address written in decimal with 4 numbers separated by dots whereas IPv6 addresses are 128-bits written in hexadecimal & separated by colons.

9. ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.
a) TCP Spoofing
b) TCP Blind Spoofing
c) IP Spoofing
d) IP Blind Spoofing
View Answer

Answer: b
Explanation: TCP Blind Spoofing is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

10. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.
a) SYN flooding attack
b) ACK flooding attack
c) SYN & ACK flooding attack
d) Packet flooding attack
View Answer

Answer: a
Explanation: SYN flooding attack is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server. The SYN & ACK segments need to begin in a TCP connection.

11. Which of them is not an attack done in the network layer of the TCP/IP model?
a) MITM attack
b) DoS attack
c) Spoofing attack
d) Shoulder surfing
View Answer

Answer: d
Explanation: MITM, Denial of Service (DoS), and spoofing attacks are possible in the network layer of the TCP/IP model. It is important to secure the network layer as it is the only means to make certain that your application is not getting flooded with attacks.

12. Which of them is not an appropriate method of router security?
a) Unused ports should be blocked
b) Unused interfaces and services should be disabled
c) Routing protocol needs to be programmed by security experts
d) Packet filtering needs to be enabled
View Answer

Answer: c
Explanation: Unused ports should be blocked, Unused interfaces and services should be disabled, and Packet filtering needs to be enabled are some of the security measures that need to be taken for the routers.
advertisement

13. Which 2 protocols are used in the Transport layer of the TCP/IP model?
a) UDP and HTTP
b) TCP and UDP
c) HTTP and TCP
d) ICMP and HTTP
View Answer

Answer: b
Explanation: The transport layer can voluntarily declare the consistency of communications. Transmission Control Protocol (TCP) & User Datagram Protocol (UDP) are the most common transport layer protocols.

14. Which of the protocol is not used in the network layer of the TCP/IP model?
a) ICMP
b) IP
c) IGMP
d) HTTP
View Answer

Answer: d
Explanation: Internet Control Message Protocol (ICMP), Internet Protocol (IP) and Internet Group Management Protocol (IGMP) are used in the network layer. HTTP is used in application layer of TCP/IP model.

15. ____________ protocol attack is done in the data-link layer.
a) HTTP
b) DNS
c) TCP/IP
d) POP
View Answer

Answer: b
Explanation: DNS protocol attack is done in the application layer of the TCP/IP model which allows attackers to modify DNS records in order to misdirect user traffic and land them in some malicious or spoofed address.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

« Prev Page - Cyber Security Questions and Answers – OSI Model Security – 2
» Next Page - Cyber Security Questions and Answers – Data Leakage and Prevention – 1

« Cyber Security Questions and Answers – OSI Model Security – 2
Cyber Security Questions and Answers – Data Leakage and Prevention – 1 »
advertisement

Deep Dive @ Sanfoundry:

  1. Information Technology Questions and Answers
  2. Oracle Database Questions and Answers
  3. Neural Networks Questions and Answers
  4. Computer Fundamentals Questions and Answers
  5. Java Programming Examples on Networking
  6. C# Programming Examples on Networking
  7. IOT Questions and Answers
  8. Computer Networks Questions and Answers
  9. Cryptography and Network Security Questions and Answers
  10. Cyber Security Questions and Answers
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer and SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage & Cluster Administration, Advanced C Programming, SAN Storage Technologies, SCSI Internals and Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him below:
LinkedIn | Facebook | Twitter | Google+

Best Careers

Developer Tracks
SAN Developer
Linux Kernel Developer
Linux Driver Developer
Linux Network Developer

Live Training Photos
Mentoring
Software Productivity
GDB Assignment
Sanfoundry is No. 1 choice for Deep Hands-ON Trainings in SAN, Linux & C, Kernel Programming. Our Founder has trained employees of almost all Top Companies in India such as VMware, Citrix, Oracle, Motorola, Ericsson, Aricent, HP, Intuit, Microsoft, Cisco, SAP Labs, Siemens, Symantec, Redhat, Chelsio, Cavium, ST-Micro, Samsung, LG-Soft, Wipro, TCS, HCL, IBM, Accenture, HSBC, Mphasis, Tata-Elxsi, Tata VSNL, Mindtree, Cognizant and Startups.

Best Trainings

SAN I - Technology
SAN II - Admin
Linux Fundamentals
Advanced C Training
Linux-C Debugging
System Programming
Network Programming
Linux Threads
Kernel Programming
Kernel Debugging
Linux Device Drivers

Best Reference Books

Computer Science Books
Algorithm & Programming Books
Electronics Engineering Books
Electrical Engineering Books
Chemical Engineering Books
Civil Engineering Books
Mechanical Engineering Books
Industrial Engineering Books
Instrumentation Engg Books
Metallurgical Engineering Books
All Stream Best Books

Questions and Answers

1000 C Questions & Answers
1000 C++ Questions & Answers
1000 C# Questions & Answers
1000 Java Questions & Answers
1000 Linux Questions & Answers
1000 Python Questions
1000 PHP Questions & Answers
1000 Hadoop Questions
Cloud Computing Questions
Computer Science Questions
All Stream Questions & Answers

India Internships

Computer Science Internships
Instrumentation Internships
Electronics Internships
Electrical Internships
Mechanical Internships
Industrial Internships
Systems Internships
Chemical Internships
Civil Internships
IT Internships
All Stream Internships

About Sanfoundry

About Us
Copyright
Terms
Privacy Policy
Jobs
Bangalore Training
Online Training
Developers Track
Mentoring Sessions
Contact Us
Sitemap
© 2011 Sanfoundry. All Rights Reserved.