41. | _________________ can be alternatively termed as password guessing attack. |
Discuss |
Answer: (b).active online
|
42. | ________________ attacks are carried out from a location other than the real computer where the password reside or was used. |
Discuss |
Answer: (c).offline password
|
43. | _______________ attacks always need physical access to the system that is having password file or the hacker needs to crack the system by other means. |
Discuss |
Answer: (b).offline
|
44. | Which of the following is not an example of offline password attack? |
Discuss |
Answer: (d).Spamming attack
|
45. | Passwords need to be kept encrypted to protect from such offline attacks. |
Discuss |
Answer: (a).True
|
46. | Saving passwords in the browser is a good habit. |
Discuss |
Answer: (b).False
|
47. | Which of the following is not an advantage of dictionary attack? |
Discuss |
Answer: (d).Very tough and inefficient
|
48. | A _______________ is a process of breaking a password protected system or server by simply & automatically entering every word in a dictionary as a password. |
Discuss |
Answer: (a).Dictionary attack
|
49. | Which of the following comes under the advantage of dictionary attack? |
Discuss |
Answer: (c).Very fast
|
50. | The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute force. |
Discuss |
Answer: (a).True
|