adplus-dvertising
frame-decoration

Question

________________ attacks are carried out from a location other than the real computer where the password reside or was used.

a.

passive online

b.

active online

c.

offline password

d.

non-electronic

Answer: (c).offline password

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ________________ attacks are carried out from a location other than the real computer where the password reside or was used.

Similar Questions

Discover Related MCQs

Q. _______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means.

Q. Which of the following is not an example of offline password attack?

Q. Passwords need to be kept encrypted to protect from such offline attacks.

Q. Saving passwords in the browser is a good habit.

Q. Which of the following is not an advantage of dictionary attack?

Q. A _______________ is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password.

Q. Which of the following comes under the advantage of dictionary attack?

Q. The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute force.

Q. Brute force attack is ______________

Q. A _____________ attack one of the simplest processes of gaining access to any password-protected system.

Q. ____________ attack is a combination of Dictionary attack & brute force attack.

Q. Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.

Q. _______________ are based on dictionary attack techniques.

Q. _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.

Q. Which of the following is not an example of non-technical attack techniques?

Q. __________ passwords are next level of security.

Q. BIOS is abbreviated as _______________

Q. Most computers have BIOS which can be configured so that it can ask for a password once the system starts.

Q. Find out, select & uninstall all ________________ programs from your computer.

Q. As a backup for securing your device, it is necessary to create a _____________