adplus-dvertising
51. Brute force attack is ______________
a. fast
b. inefficient
c. slow
d. complex to understand
Discuss
Answer: (c).slow

52. A _____________ attack one of the simplest processes of gaining access to any password-protected system.
a. Clickjacking
b. Brute force
c. Eavesdropping
d. Waterhole
Discuss
Answer: (b).Brute force

53. ____________ attack is a combination of Dictionary attack & brute force attack.
a. Syllable
b. Syllabi
c. Database
d. Phishing
Discuss
Answer: (a).Syllable

54. Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.
a. Syllable attack
b. Rule-based attack
c. Offline attack
d. Hybrid attack
Discuss
Answer: (b).Rule-based attack

55. _______________ are based on dictionary attack techniques.
a. Hybrid attacks
b. Network attacks
c. TCP attacks
d. Database attacks
Discuss
Answer: (a).Hybrid attacks

56. _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.
a. Syllable attack
b. Rule-based attack
c. Offline attack
d. Hybrid attack
Discuss
Answer: (d).Hybrid attack

57. Which of the following is not an example of non-technical attack techniques?
a. Shoulder surfing
b. Keyboard sniffing
c. Phishing
d. Social engineering
Discuss
Answer: (c).Phishing

58. __________ passwords are next level of security.
a. BIOS
b. CMOS
c. SMOS
d. BOIS
Discuss
Answer: (a).BIOS

59. BIOS is abbreviated as _______________
a. Basic Input Output Server
b. Basic Internet Output Systems
c. Basic Input Output System
d. Battery-based Input Output System
Discuss
Answer: (c).Basic Input Output System

60. Most computers have BIOS which can be configured so that it can ask for a password once the system starts.
a. True
b. False
c. May be True or False
d. Can't say
Discuss
Answer: (a).True

Page 6 of 10