adplus-dvertising
31. System hacking involves password hacking as one of the major hacking methodologies.
a. True
b. False
c. May be True or False
d. Can't say
Discuss
Answer: (a).True

32. Password cracking in system hacking is of ________ types.
a. 2
b. 3
c. 4
d. 5
Discuss
Answer: (c).4

33. There are ________ major types of passwords.
a. 4
b. 5
c. 6
d. 7
Discuss
Answer: (d).7

34. In _______________ attacks an attacker do not contact with authorizing party for stealing password.
a. passive online
b. active online
c. offline
d. non-electronic
Discuss
Answer: (a).passive online

35. Which of the following is an example of passive online attack?
a. Phishing
b. Social Engineering
c. Spamming
d. Wire sniffing
Discuss
Answer: (d).Wire sniffing

36. Which of the following is not an example of a passive online attack?
a. MiTM
b. Reply Attack
c. Phishing
d. Wire sniffing
Discuss
Answer: (c).Phishing

37. Which of the following do not comes under hurdles of passive online attack for hackers?
a. Hard to perpetrate
b. Computationally complex
c. Time taking, so patience has to be there
d. Tools not available
Discuss
Answer: (d).Tools not available

38. Which of the following case comes under victims’ list of an active online attack?
a. Strong password based accounts
b. Unsecured HTTP users
c. Open authentication points
d. Logged in systems and services
Discuss
Answer: (c).Open authentication points

39. In _______________ password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account.
a. passive online
b. active online
c. offline attack
d. non-electronic
Discuss
Answer: (b).active online

40. Which of them is not a disadvantage of active online attack?
a. Takes a long time
b. Easily and automatically detected
c. Need high network bandwidth
d. Need the patience to crack
Discuss
Answer: (b).Easily and automatically detected

Page 4 of 10