Recent questions tagged Cyber-security-interview-questions-answers

0 votes
    There are __________ different versions of IP popularly used. (a) 2 (b) 3 (c) 4 (d) 5 I have been asked ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not an attack done in the network layer of the TCP/IP model? (a) MITM attack (b) DoS ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of them is not an appropriate method of router security? (a) Unused ports should be blocked (b) Unused ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which 2 protocols are used in the Transport layer of the TCP/IP model? (a) UDP and HTTP (b) TCP and UDP ( ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the protocol is not used in the network layer of the TCP/IP model? (a) ICMP (b) IP (c) IGMP ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    ____________ protocol attack is done in the data-link layer. (a) HTTP (b) DNS (c) TCP/IP (d) POP I got ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    Data leakage threats do not usually occur from which of the following? (a) Web and email (b) Mobile data storage ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
...