What is the simplest method to gain access to a system?
A) Social engineering
B) Cracking a password
C) Guessing a password
D) Installing malware
Answer: C) Guessing a password
Which type of password is most vulnerable to attack?
A) Letters only
B) Numbers only
C) Special characters only
D) Letters, numbers, and special characters
Answer: A) Letters only
Which of the following is an automated password guessing tool?
A) Nmap
B) Hydra
C) Wireshark
D) Nessus
Answer: B) Hydra
A brute-force attack is categorized as what type of attack?
A) Passive online attack
B) Active online attack
C) Offline attack
D) Nonelectronic attack
Answer: C) Offline attack
Which password characteristic is recommended by the EC-Council?
A) Minimum of 6 characters
B) Must contain at least 2 categories of characters
C) Must not contain any part of the user’s account name
D) Maximum of 10 characters
Answer: C) Must not contain any part of the user’s account name
Which of the following is NOT a type of password attack?
A) Man-in-the-middle
B) Hybrid attack
C) Shoulder surfing
D) SQL injection
Answer: D) SQL injection
What type of attack involves capturing authentication packets and reusing them later?
A) Man-in-the-middle attack
B) Replay attack
C) Dictionary attack
D) Phishing attack
Answer: B) Replay attack
What is a common tool for offline password attacks?
A) John the Ripper
B) Nmap
C) Metasploit
D) Nikto
Answer: A) John the Ripper
What is a hybrid password attack?
A) It substitutes numbers or symbols in a dictionary attack
B) It uses only numbers
C) It guesses passwords manually
D) It intercepts network traffic
Answer: A) It substitutes numbers or symbols in a dictionary attack
Which is NOT a password cracking countermeasure?
A) Using smart cards
B) Enforcing strong passwords
C) Limiting login attempts
D) Using only letters for passwords
Answer: D) Using only letters for passwords