| Osi Model Security 1 | Social Networking Security |
| Network Security |
A. Open systems interconnection
B. Open software interconnection
C. Open systems internet
D. Open software internet
Explanation: The OSI model is 7-layer architecture where each layer is having some specific functionality to perform. All these layers work in collaboration for transmitting the data from 1 person to another worldwide.
A. Physical theft of data & hardware
B. Physical damage or destruction of data & hardware
C. Unauthorized network access
D. Keystroke & other input logging
Explanation: Unauthorized network access is not an example of physical layer vulnerability. The rest three – Physical theft of data & hardware, damage or destruction of data & hardware and keystroke & Other Input Logging are physical layer vulnerabilities.
A. Physical
B. Data-link
C. Network
D. Application
Explanation: In the physical layer, vulnerabilities are directly associated with physical access to networks and hardware such as unauthorised network access, damage or destruction of data & hardware and keystroke & Other Input Logging.
A. True
B. False
C.
D.
Explanation: Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer. Other such issues are unauthorised network access, damage or destruction of data & hardware and keystroke & Other Input Logging.
A. Mac address spoofing
B. VLAN circumvention
C. Switches may be forced for flooding traffic to all VLAN ports
D. Overloading of transport-layer mechanisms
Explanation: MAC Address Spoofing, VLAN circumvention and switches may be forced for flooding traffic to all VLAN ports are examples of data-link layer vulnerability.
A. VLAN attack
B. VLAN circumvention
C. VLAN compromisation method
D. Data-link evading
Explanation: VLAN Circumvention is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls implemented using subnets and firewalls.
A. Switches
B. Routers
C. Hubs
D. Repeaters
Explanation: Switches may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that are connected to a VLAN. It is a vulnerability of data link layer.
A. Route spoofing
B. Identity & resource id vulnerability
C. Ip address spoofing
D. Weak or non-existent authentication
Explanation: Weak or non-existent authentication is a vulnerability of the session layer. Route spoofing, identity & resource ID vulnerability & IP Address Spoofing are examples of network layer vulnerability.
A. Mac address spoofing
B. Route spoofing
C. Weak or non-existent authentication
D. Keystroke & other input logging
Explanation: Keystroke & other input logging is an example of physical layer vulnerability. Other such physical layer vulnerabilities are unauthorized network access, damage or destruction of data & hardware and keystroke & Other Input Logging.
A. Physical theft of data
B. VLAN circumvention
C. Route spoofing
D. Weak or non-existent authentication
Explanation: VLAN circumvention is an example of data-link layer vulnerability. MAC Address Spoofing, as well as switches, may be forced for flooding traffic to all VLAN ports are some other examples of data-link layer vulnerability.