52. | A _____________ attack one of the simplest processes of gaining access to any password-protected system. |
Discuss |
Answer: (b).Brute force
|
53. | ____________ attack is a combination of Dictionary attack & brute force attack. |
Discuss |
Answer: (a).Syllable
|
54. | Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack. |
Discuss |
Answer: (b).Rule-based attack
|
55. | _______________ are based on dictionary attack techniques. |
Discuss |
Answer: (a).Hybrid attacks
|
56. | _____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols. |
Discuss |
Answer: (d).Hybrid attack
|
57. | Which of the following is not an example of non-technical attack techniques? |
Discuss |
Answer: (c).Phishing
|
58. | __________ passwords are next level of security. |
Discuss |
Answer: (a).BIOS
|
59. | BIOS is abbreviated as _______________ |
Discuss |
Answer: (c).Basic Input Output System
|
60. | Most computers have BIOS which can be configured so that it can ask for a password once the system starts. |
Discuss |
Answer: (a).True
|