 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Passwords need to be kept encrypted to protect from such offline attacks. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 2. | Which of the following is not an example of offline password attack? | 
| A. | Dictionary attack | 
| B. | Rainbow attacks | 
| C. | Brute force attack | 
| D. | Spamming attack | 
| Answer» E. | |
| 3. | _______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. | 
| A. | online | 
| B. | offline | 
| C. | password | 
| D. | non-electronic | 
| Answer» C. password | |
| 4. | ________________ attacks are carried out from a location other than the real computer where the password reside or was used. | 
| A. | passive online | 
| B. | active online | 
| C. | offline password | 
| D. | non-electronic | 
| Answer» D. non-electronic | |
| 5. | _________________ can be alternatively termed as password guessing attack. | 
| A. | passive online | 
| B. | active online | 
| C. | offline attack | 
| D. | non-electronic | 
| Answer» C. offline attack | |
| 6. | Which of them is not a disadvantage of active online attack? | 
| A. | Takes a long time | 
| B. | Easily and automatically detected | 
| C. | Need high network bandwidth | 
| D. | Need the patience to crack | 
| Answer» C. Need high network bandwidth | |
| 7. | In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account. | 
| A. | passive online | 
| B. | active online | 
| C. | offline attack | 
| D. | non-electronic | 
| Answer» C. offline attack | |
| 8. | Which of the following case comes under victims’ list of an active online attack? | 
| A. | Strong password based accounts | 
| B. | Unsecured HTTP users | 
| C. | Open authentication points | 
| D. | Logged in systems and services | 
| Answer» D. Logged in systems and services | |
| 9. | Which of the following do not comes under hurdles of passive online attack for hackers? | 
| A. | Hard to perpetrate | 
| B. | Computationally complex | 
| C. | Time taking, so patience has to be there | 
| D. | Tools not available | 
| Answer» E. | |
| 10. | Which of the following is not an example of a passive online attack? | 
| A. | MiTM | 
| B. | Reply Attack | 
| C. | Phishing | 
| D. | Wire sniffing | 
| Answer» D. Wire sniffing | |
| 11. | Which of the following is an example of passive online attack? | 
| A. | Phishing | 
| B. | Social Engineering | 
| C. | Spamming | 
| D. | Wire sniffing | 
| Answer» E. | |
| 12. | In _______________ attacks an attacker do not contact with authorizing party for stealing password. | 
| A. | passive online | 
| B. | active online | 
| C. | offline | 
| D. | non-electronic | 
| Answer» B. active online | |
| 13. | There are ________ major types of passwords. | 
| A. | 4 | 
| B. | 5 | 
| C. | 6 | 
| D. | 7 | 
| Answer» E. | |
| 14. | Password cracking in system hacking is of ________ types. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» D. 5 | |
| 15. | System hacking involves password hacking as one of the major hacking methodologies. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |