Q.1
Which of the following is not a transport layer vulnerability?
  • a) Mishandling of undefined, poorly defined
  • b) The Vulnerability that allows “fingerprinting” & other enumeration of host information
  • c) Overloading of transport-layer mechanisms
  • d) Unauthorized network access
Q.2
Which of the following is not session layer vulnerability?
  • a) Mishandling of undefined, poorly defined
  • b) Spoofing and hijacking of data based on failed authentication attempts
  • c) Passing of session-credentials allowing intercept and unauthorized use
  • d) Weak or non-existent authentication mechanisms
Q.3
Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?
  • a) Physical layer
  • b) Data-link Layer
  • c) Session layer
  • d) Presentation layer
Q.4
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.
  • a) True
  • b) False
Q.5
Which of the following is not an example of presentation layer issues?
  • a) Poor handling of unexpected input can lead to the execution of arbitrary instructions
  • b) Unintentional or ill-directed use of superficially supplied input
  • c) Cryptographic flaws in the system may get exploited to evade privacy
  • d) Weak or non-existent authentication mechanisms
Q.6
Which of the following is not a vulnerability of the application layer?
  • a) Application design bugs may bypass security controls
  • b) Inadequate security controls force “all-or-nothing” approach
  • c) Logical bugs in programs may be by chance or on purpose be used for crashing programs
  • d) Overloading of transport-layer mechanisms
Q.7
Which of the following is an example of Transport layer vulnerability?
  • a) weak or non-existent mechanisms for authentication
  • b) overloading of transport-layer mechanisms
  • c) poor handling of unexpected input
  • d) highly complex application security controls
Q.8
Which of the following is an example of session layer vulnerability?
  • a) weak or non-existent mechanisms for authentication
  • b) overloading of transport-layer mechanisms
  • c) poor handling of unexpected input
  • d) highly complex application security controls
Q.9
Which of the following is an example of presentation layer vulnerability?
  • a) weak or non-existent mechanisms for authentication
  • b) overloading of transport-layer mechanisms
  • c) highly complex application security controls
  • d) poor handling of unexpected input
Q.10
Which of the following is an example of application layer vulnerability?
  • a) Cryptographic flaws lead to the privacy issue
  • b) Very complex application security controls
  • c) MAC Address Spoofing
  • d) Weak or non-existent authentication
0 h : 0 m : 1 s