Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The full form of OSI is OSI model is ______________ a) Open Systems Interconnection b) Open Software Interconnection c) Open Systems Internet d) Open Software

The full form of OSI is OSI model is ______________

a) Open Systems Interconnection

b) Open Software Interconnection

c) Open Systems Internet

d) Open Software Internet

3. Which of the following is not physical layer vulnerability?

a) Physical theft of data & hardware

b) Physical damage or destruction of data & hardware

c) Unauthorized network access

d) Keystroke & Other Input Logging

4. In __________________ layer, vulnerabilities are directly associated with physical access to networks and hardware.

a) physical

b) data-link

c) network

d) application

5. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

a) True

b) False

6. Which of the following is not a vulnerability of the data-link layer?

a) MAC Address Spoofing

b) VLAN circumvention

c) Switches may be forced for flooding traffic to all VLAN ports

d) Overloading of transport-layer mechanisms

7. ____________ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

a) VLAN attack

b) VLAN Circumvention

c) VLAN compromisation method

d) Data-link evading

8. ________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

a) Switches

b) Routers

c) Hubs

d) Repeaters

9. Which of the following is not a vulnerability of the network layer?

a) Route spoofing

b) Identity & Resource ID Vulnerability

c) IP Address Spoofing

d) Weak or non-existent authentication

10. Which of the following is an example of physical layer vulnerability?

a) MAC Address Spoofing

b) Physical Theft of Data

c) Route spoofing

d) Weak or non-existent authentication

11. Which of the following is an example of data-link layer vulnerability?

a) MAC Address Spoofing

b) Physical Theft of Data

c) Route spoofing

d) Weak or non-existent authentication

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Marketing The Core

Authors: Roger Kerin

8th Edition

1260483517, 9781260483512

More Books

Students also viewed these Marketing questions

Question

A chipped cracked sheet of glass is useless to us.

Answered: 1 week ago

Question

Youll receive our usual cheerful prompt service.

Answered: 1 week ago