MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
IN_________________PASSWORD_GRABBING_ATTACK_THE_ATTACKER_DIRECTLY_TRIES_DIFFERENT_PASSWORDS_1-BY-1_AGAINST_VICTIM‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•S_SYSTEM/ACCOUNT.?$# |
| A. | passive online |
| B. | active online |
| C. | offline attack |
| D. | non-electronic |
| Answer» C. offline attack | |
| 2. |
_________________ can be alternatively termed as password guessing attack.$ |
| A. | passive online |
| B. | active online |
| C. | offline attack |
| D. | non-electronic |
| Answer» C. offline attack | |
| 3. |
Which_of_them_is_not_a_disadvantage_of_active_online_attack?$ |
| A. | Takes a long time |
| B. | Easily and automatically detected |
| C. | Need high network bandwidth |
| D. | Need the patience to crack |
| Answer» C. Need high network bandwidth | |
| 4. |
Passwords need to be kept encrypted to protect from such offline attacks. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 5. |
Which of the following is not an example of offline password attack? |
| A. | Dictionary attack |
| B. | Rainbow attacks |
| C. | Brute force attack |
| D. | Spamming attack |
| Answer» E. | |
| 6. |
_______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. |
| A. | online |
| B. | offline |
| C. | password |
| D. | non-electronic |
| Answer» C. password | |
| 7. |
_________________attacks_are_carried_out_from_a_location_other_than_the_real_computer_where_the_password_reside_or_was_used. |
| A. | passive online |
| B. | active online |
| C. | offline password |
| D. | non-electronic |
| Answer» D. non-electronic | |
| 8. |
Which of the following case comes under victims’ list of an active online attack?# |
| A. | Strong password based accounts |
| B. | Unsecured HTTP users |
| C. | Open authentication points |
| D. | Logged in systems and services |
| Answer» D. Logged in systems and services | |
| 9. |
Which of the following do not comes under hurdles of passive online attack for hackers? |
| A. | Hard to perpetrate |
| B. | Computationally complex |
| C. | Time taking, so patience has to be there |
| D. | Tools not available |
| Answer» E. | |
| 10. |
Which of the following is an example of passive online attack? |
| A. | Phishing |
| B. | Social Engineering |
| C. | Spamming |
| D. | Wire sniffing |
| Answer» E. | |
| 11. |
In _______________ attacks an attacker do not contact with authorizing party for stealing password. |
| A. | passive online |
| B. | active online |
| C. | offline |
| D. | non-electronic |
| Answer» B. active online | |
| 12. |
There are ________ major types of passwords. |
| A. | 4 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» E. | |
| 13. |
Password cracking in system hacking is of ________ types. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» D. 5 | |
| 14. |
System hacking involves password hacking as one of the major hacking methodologies. |
| A. | True |
| B. | False |
| Answer» B. False | |