Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views3 pages

Questions

Uploaded by

sakthivelmaribe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views3 pages

Questions

Uploaded by

sakthivelmaribe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

What is the simplest method to gain access to a system?

A) Social engineering

B) Cracking a password

C) Guessing a password

D) Installing malware

Answer: C) Guessing a password

Which type of password is most vulnerable to attack?

A) Letters only

B) Numbers only

C) Special characters only

D) Letters, numbers, and special characters

Answer: A) Letters only

Which of the following is an automated password guessing tool?

A) Nmap

B) Hydra

C) Wireshark

D) Nessus

Answer: B) Hydra

A brute-force attack is categorized as what type of attack?

A) Passive online attack

B) Active online attack

C) Offline attack

D) Nonelectronic attack

Answer: C) Offline attack

Which password characteristic is recommended by the EC-Council?

A) Minimum of 6 characters
B) Must contain at least 2 categories of characters

C) Must not contain any part of the user’s account name

D) Maximum of 10 characters

Answer: C) Must not contain any part of the user’s account name

Which of the following is NOT a type of password attack?

A) Man-in-the-middle

B) Hybrid attack

C) Shoulder surfing

D) SQL injection

Answer: D) SQL injection

What type of attack involves capturing authentication packets and reusing them later?

A) Man-in-the-middle attack

B) Replay attack

C) Dictionary attack

D) Phishing attack

Answer: B) Replay attack

What is a common tool for offline password attacks?

A) John the Ripper

B) Nmap

C) Metasploit

D) Nikto

Answer: A) John the Ripper

What is a hybrid password attack?

A) It substitutes numbers or symbols in a dictionary attack

B) It uses only numbers

C) It guesses passwords manually

D) It intercepts network traffic


Answer: A) It substitutes numbers or symbols in a dictionary attack

Which is NOT a password cracking countermeasure?

A) Using smart cards

B) Enforcing strong passwords

C) Limiting login attempts

D) Using only letters for passwords

Answer: D) Using only letters for passwords

You might also like