

MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Passwords need to be kept encrypted to protect from such offline attacks. |
A. | True |
B. | False |
Answer» B. False | |
2. |
Which of the following is not an example of offline password attack? |
A. | Dictionary attack |
B. | Rainbow attacks |
C. | Brute force attack |
D. | Spamming attack |
Answer» E. | |
3. |
_______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. |
A. | online |
B. | offline |
C. | password |
D. | non-electronic |
Answer» C. password | |
4. |
________________ attacks are carried out from a location other than the real computer where the password reside or was used. |
A. | passive online |
B. | active online |
C. | offline password |
D. | non-electronic |
Answer» D. non-electronic | |
5. |
_________________ can be alternatively termed as password guessing attack. |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
6. |
Which of them is not a disadvantage of active online attack? |
A. | Takes a long time |
B. | Easily and automatically detected |
C. | Need high network bandwidth |
D. | Need the patience to crack |
Answer» C. Need high network bandwidth | |
7. |
In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account. |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
8. |
Which of the following case comes under victims’ list of an active online attack? |
A. | Strong password based accounts |
B. | Unsecured HTTP users |
C. | Open authentication points |
D. | Logged in systems and services |
Answer» D. Logged in systems and services | |
9. |
Which of the following do not comes under hurdles of passive online attack for hackers? |
A. | Hard to perpetrate |
B. | Computationally complex |
C. | Time taking, so patience has to be there |
D. | Tools not available |
Answer» E. | |
10. |
Which of the following is not an example of a passive online attack? |
A. | MiTM |
B. | Reply Attack |
C. | Phishing |
D. | Wire sniffing |
Answer» D. Wire sniffing | |
11. |
Which of the following is an example of passive online attack? |
A. | Phishing |
B. | Social Engineering |
C. | Spamming |
D. | Wire sniffing |
Answer» E. | |
12. |
In _______________ attacks an attacker do not contact with authorizing party for stealing password. |
A. | passive online |
B. | active online |
C. | offline |
D. | non-electronic |
Answer» B. active online | |
13. |
There are ________ major types of passwords. |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» E. | |
14. |
Password cracking in system hacking is of ________ types. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
15. |
System hacking involves password hacking as one of the major hacking methodologies. |
A. | True |
B. | False |
Answer» B. False | |