Cyber Security » Osi Model Security 1
The full form of OSI is OSI model is ______________

A. Open systems interconnection
B. Open software interconnection
C. Open systems internet
D. Open software internet

Explanation: The OSI model is 7-layer architecture where each layer is having some specific functionality to perform. All these layers work in collaboration for transmitting the data from 1 person to another worldwide.

Which of the following is not physical layer vulnerability?

A. Physical theft of data & hardware
B. Physical damage or destruction of data & hardware
C. Unauthorized network access
D. Keystroke & other input logging

Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke & Other Input Logging are physical layer vulnerabilities.

In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. Physical
B. Data-link
C. Network
D. Application

Explanation: In the physical layer, vulnerabilities are directly associated with physical access to networks and hardware such as unauthorised network access, damage or destruction of data & hardware and keystroke & Other Input Logging.

Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

A. True
B. False
C.
D.

Explanation: Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. Other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & Other Input Logging.

Which of the following is not a vulnerability of the data-link layer?

A. Mac address spoofing
B. VLAN circumvention
C. Switches may be forced for flooding traffic to all VLAN ports
D. Overloading of transport-layer mechanisms

Explanation: MAC Address Spoofing, VLAN circumvention and switches may be forced for flooding traffic to all VLAN ports are examples of data-link layer vulnerability.

____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A. VLAN attack
B. VLAN circumvention
C. VLAN compromisation method
D. Data-link evading

Explanation: VLAN Circumvention is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls implemented using subnets and firewalls.

________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A. Switches
B. Routers
C. Hubs
D. Repeaters

Explanation: Switches may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that are connected to a VLAN. It is a vulnerability of data link layer.

Which of the following is not a vulnerability of the network layer?

A. Route spoofing
B. Identity & resource id vulnerability
C. Ip address spoofing
D. Weak or non-existent authentication

Explanation: Weak or non-existent authentication is a vulnerability of the session layer. Route spoofing, identity & resource ID vulnerability & IP Address Spoofing are examples of network layer vulnerability.

Which of the following is an example of physical layer vulnerability?

A. Mac address spoofing
B. Route spoofing
C. Weak or non-existent authentication
D. Keystroke & other input logging

Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.

Which of the following is an example of data-link layer vulnerability?

A. Physical theft of data
B. VLAN circumvention
C. Route spoofing
D. Weak or non-existent authentication

Explanation: VLAN circumvention is an example of data-link layer vulnerability. MAC Address Spoofing, as well as switches, may be forced for flooding traffic to all VLAN ports are some other examples of data-link layer vulnerability.