+1 vote
124 views
in Cyber Security by (69.5k points)
Which of the following is an example of data-link layer vulnerability?

(a) Physical Theft of Data

(b) VLAN circumvention

(c) Route spoofing

(d) Weak or non-existent authentication

I got this question in an interview for internship.

My question is from Network Models in section Understanding Network Models for Security of Cyber Security

1 Answer

0 votes
by (65.4k points)

The correct answer is:

(b) VLAN circumvention

VLAN circumvention is a data-link layer vulnerability. It involves bypassing or misconfiguring VLANs (Virtual Local Area Networks) to gain unauthorized access to networks. Since VLANs operate at the data-link layer (Layer 2) of the OSI model, this is considered a vulnerability in the data-link layer.

Here’s why the other options are not correct for the data-link layer:

  • (a) Physical Theft of Data: This is more of a physical security issue, not a data-link layer vulnerability.
  • (c) Route spoofing: This involves manipulating routing tables, which is related to Layer 3 (Network layer) of the OSI model.
  • (d) Weak or non-existent authentication: This can apply to many layers, but it's not specific to the data-link layer. It could be related to application, transport, or network layers depending on the context.

VLAN circumvention is the only option that specifically involves Layer 2 vulnerabilities.

Related questions

Welcome to TalkJarvis QnA, a question-answer community website for the people by the people. On TalkJarvis QnA you can ask your doubts, curiosity, questions and whatever going in your mind either related to studies or others. Experts and people from different fields will answer.

Most popular tags

biology – class 12 biology – class 11 construction & building materials chemistry – class 12 electronic devices & circuits network theory data structures & algorithms ii cell biology ic engine insurance finance money computational fluid dynamics engineering physics i discrete mathematics chemistry – class 11 aerodynamics casting-forming-welding i engineering mathematics operating system casting-forming-welding ii engineering drawing mysql engineering geology digital circuits wireless mobile energy management electrical measurements digital communications cyber security analytical instrumentation embedded systems electric drives cytogenetics advanced machining computer fundamentals life sciences basic civil engineering iot design of electrical machines physics – class 12 applied chemistry dairy engineering basic chemical engineering cloud computing microprocessor bioinformatics aircraft design aircraft maintenance software engineering drug biotechnology digital signal processing biochemistry data structures & algorithms i automotive engine design avionics engineering material & metallurgy energy engineering cognitive radio unix electrical machines biomedical instrumentation object oriented programming electromagnetic theory power electronics analog communications bioprocess engineering civil engineering drawing engineering metrology physics – class 11 mathematics – class 12 engineering chemistry i basic electrical engineering unit processes mongodb signals and systems cryptograph & network security hadoop mathematics – class 11 engineering physics ii html control systems engineering mechanics antennas analog circuits computer network java sql server javascript concrete technology chemical process calculation artificial intelligence design of steel structures c++ database management computer architecture engineering chemistry ii corrosion engineering chemical technology dc machines
...