

MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
IN_________________PASSWORD_GRABBING_ATTACK_THE_ATTACKER_DIRECTLY_TRIES_DIFFERENT_PASSWORDS_1-BY-1_AGAINST_VICTIM‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_SYSTEM/ACCOUNT.?$# |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
2. |
_________________ can be alternatively termed as password guessing attack.$ |
A. | passive online |
B. | active online |
C. | offline attack |
D. | non-electronic |
Answer» C. offline attack | |
3. |
Which_of_them_is_not_a_disadvantage_of_active_online_attack?$ |
A. | Takes a long time |
B. | Easily and automatically detected |
C. | Need high network bandwidth |
D. | Need the patience to crack |
Answer» C. Need high network bandwidth | |
4. |
Passwords need to be kept encrypted to protect from such offline attacks. |
A. | True |
B. | False |
Answer» B. False | |
5. |
Which of the following is not an example of offline password attack? |
A. | Dictionary attack |
B. | Rainbow attacks |
C. | Brute force attack |
D. | Spamming attack |
Answer» E. | |
6. |
_______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. |
A. | online |
B. | offline |
C. | password |
D. | non-electronic |
Answer» C. password | |
7. |
_________________attacks_are_carried_out_from_a_location_other_than_the_real_computer_where_the_password_reside_or_was_used. |
A. | passive online |
B. | active online |
C. | offline password |
D. | non-electronic |
Answer» D. non-electronic | |
8. |
Which of the following case comes under victims’ list of an active online attack?# |
A. | Strong password based accounts |
B. | Unsecured HTTP users |
C. | Open authentication points |
D. | Logged in systems and services |
Answer» D. Logged in systems and services | |
9. |
Which of the following do not comes under hurdles of passive online attack for hackers? |
A. | Hard to perpetrate |
B. | Computationally complex |
C. | Time taking, so patience has to be there |
D. | Tools not available |
Answer» E. | |
10. |
Which of the following is an example of passive online attack? |
A. | Phishing |
B. | Social Engineering |
C. | Spamming |
D. | Wire sniffing |
Answer» E. | |
11. |
In _______________ attacks an attacker do not contact with authorizing party for stealing password. |
A. | passive online |
B. | active online |
C. | offline |
D. | non-electronic |
Answer» B. active online | |
12. |
There are ________ major types of passwords. |
A. | 4 |
B. | 5 |
C. | 6 |
D. | 7 |
Answer» E. | |
13. |
Password cracking in system hacking is of ________ types. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» D. 5 | |
14. |
System hacking involves password hacking as one of the major hacking methodologies. |
A. | True |
B. | False |
Answer» B. False | |