 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | IN_________________PASSWORD_GRABBING_ATTACK_THE_ATTACKER_DIRECTLY_TRIES_DIFFERENT_PASSWORDS_1-BY-1_AGAINST_VICTIM‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_SYSTEM/ACCOUNT.?$# | 
| A. | passive online | 
| B. | active online | 
| C. | offline attack | 
| D. | non-electronic | 
| Answer» C. offline attack | |
| 2. | _________________ can be alternatively termed as password guessing attack.$ | 
| A. | passive online | 
| B. | active online | 
| C. | offline attack | 
| D. | non-electronic | 
| Answer» C. offline attack | |
| 3. | Which_of_them_is_not_a_disadvantage_of_active_online_attack?$ | 
| A. | Takes a long time | 
| B. | Easily and automatically detected | 
| C. | Need high network bandwidth | 
| D. | Need the patience to crack | 
| Answer» C. Need high network bandwidth | |
| 4. | Passwords need to be kept encrypted to protect from such offline attacks. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 5. | Which of the following is not an example of offline password attack? | 
| A. | Dictionary attack | 
| B. | Rainbow attacks | 
| C. | Brute force attack | 
| D. | Spamming attack | 
| Answer» E. | |
| 6. | _______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. | 
| A. | online | 
| B. | offline | 
| C. | password | 
| D. | non-electronic | 
| Answer» C. password | |
| 7. | _________________attacks_are_carried_out_from_a_location_other_than_the_real_computer_where_the_password_reside_or_was_used. | 
| A. | passive online | 
| B. | active online | 
| C. | offline password | 
| D. | non-electronic | 
| Answer» D. non-electronic | |
| 8. | Which of the following case comes under victims’ list of an active online attack?# | 
| A. | Strong password based accounts | 
| B. | Unsecured HTTP users | 
| C. | Open authentication points | 
| D. | Logged in systems and services | 
| Answer» D. Logged in systems and services | |
| 9. | Which of the following do not comes under hurdles of passive online attack for hackers? | 
| A. | Hard to perpetrate | 
| B. | Computationally complex | 
| C. | Time taking, so patience has to be there | 
| D. | Tools not available | 
| Answer» E. | |
| 10. | Which of the following is an example of passive online attack? | 
| A. | Phishing | 
| B. | Social Engineering | 
| C. | Spamming | 
| D. | Wire sniffing | 
| Answer» E. | |
| 11. | In _______________ attacks an attacker do not contact with authorizing party for stealing password. | 
| A. | passive online | 
| B. | active online | 
| C. | offline | 
| D. | non-electronic | 
| Answer» B. active online | |
| 12. | There are ________ major types of passwords. | 
| A. | 4 | 
| B. | 5 | 
| C. | 6 | 
| D. | 7 | 
| Answer» E. | |
| 13. | Password cracking in system hacking is of ________ types. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» D. 5 | |
| 14. | System hacking involves password hacking as one of the major hacking methodologies. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |