Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

___________________ began to show up few years back on wireless access points as a new way of adding or connecting new devices.(a) WPA2(b) WPA(c) WPS(d) WEPThe question was posed to me in semester exam.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

The correct choice is (C) WPS

The explanation: WiFi Protected Setup (WPS) began to show up a few years back on wireless access points as a new way of adding or CONNECTING new DEVICES to the NETWORK by just pushing a key (within the router) & typing an eight-digit password on the client device.

2.

Which of the following is a Wireless traffic Sniffing tool?(a) Maltego(b) BurpSuit(c) Nessus(d) WiresharkThis question was addressed to me in an interview for job.Origin of the question is Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

The correct choice is (d) Wireshark

For explanation: The PROCESS of ANALYZING wireless traffic that MAY be helpful for forensic investigations or during troubleshooting any wireless issue is called Wireless Traffic Sniffing. POPULAR tools used in this case are Wireshark and KISMET.

3.

___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.(a) Wireless Traffic Sniffing(b) WiFi Traffic Sniffing(c) Wireless Traffic Checking(d) Wireless Transmission SniffingThe question was asked by my college professor while I was bunking the class.I'm obligated to ask this question of Cyber Security Types topic in portion Cyber Security Types of Cyber Security

Answer»

Right OPTION is (a) WIRELESS Traffic Sniffing

Best explanation: Wireless Traffic Sniffing is a process of ANALYZING wireless traffic that MAY be helpful for FORENSIC investigations or during troubleshooting any wireless issue.

4.

It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure.(a) True(b) FalseThis question was addressed to me in an interview for job.My question is taken from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

The correct answer is (a) True

The explanation is: It is recommended to use WPA2 or WPA3 encryption STANDARD as they are strong and more SECURE. WPA2 & WPA3 characterizes the protocols a router & Wi-Fi client devices use for PERFORMING “handshake” SECURELY for communication.

5.

WPS stands for __________________(a) WiFi Protected System(b) WiFi Protected Setup(c) WiFi Protocol Setup(d) Wireless Protected SetupI had been asked this question in an interview for internship.My question is based upon Cyber Security Types in portion Cyber Security Types of Cyber Security

Answer»

The correct answer is (b) WIFI Protected Setup

The best EXPLANATION: WPS stands for WiFi Protected Setup began to show up a few years back on wireless access points as a NEW way of adding or connecting new devices to the network by just pushing a KEY (WITHIN the router) & inserting the password.

6.

When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________(a) AP-handshaking(b) 4-way handshake(c) 4-way connection(d) wireless handshakingThe question was posed to me in my homework.The origin of the question is Cyber Security Types topic in portion Cyber Security Types of Cyber Security

Answer» RIGHT OPTION is (b) 4-way handshake

To elaborate: When a wireless user authenticates to any AP, both of them go in the COURSE of four-step AUTHENTICATION progression which is CALLED 4-way handshake.
7.

There are __________ types of wireless authentication modes.(a) 2(b) 3(c) 4(d) 5I had been asked this question during an interview.I'd like to ask this question from Cyber Security Types topic in portion Cyber Security Types of Cyber Security

Answer»

The correct answer is (a) 2

The explanation is: There are 2 achievable authentication TYPES or schemes which are IMPLEMENTED in the WIRELESS security. These are Pre-Shared Key – based authentication & Open Authentication.

8.

___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it for offering signal coverage.(a) Base Signal Station(b) Base Transmitter Station(c) Base Transceiver Station(d) Transceiver StationThis question was posed to me during an interview.My question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

Right OPTION is (c) Base Transceiver STATION

The best EXPLANATION: Base Transceiver Station (BTS) which is also known as a base station (BS) or radio base station (RBS) is alike as that of Access Point (AP) from 802.11, & the mobile operators use it for offering SIGNAL coverage.

9.

BTS stands for ___________________(a) Basement Transceiver Server(b) Base Transmitter Station(c) Base Transceiver Server(d) Base Transceiver StationThe question was asked during an internship interview.I would like to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer»

Right choice is (d) BASE TRANSCEIVER Station

The BEST explanation: Base Transceiver Station is a section of EQUIPMENT which facilitates wireless communication from 802.11 & the mobile OPERATORS use it for offering signal coverage. Examples are GSM, 3G, 4G etc.

10.

AP is abbreviated as _____________(a) Access Point(b) Access Port(c) Access Position(d) Accessing PortI have been asked this question in an interview for internship.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer» CORRECT answer is (a) Access Point

For explanation I would say: The CENTRAL node of 802.11 is that interface which acts as an intermediary of a WIRED & wireless network; and all the associated wireless clients’ USE this and exchange data.
11.

_______________ is the central node of 802.11 wireless operations.(a) WPA(b) Access Point(c) WAP(d) Access PortThe question was posed to me in a national level competition.My doubt stems from Cyber Security Types in portion Cyber Security Types of Cyber Security

Answer»

The correct choice is (b) Access Point

For explanation I would say: The central NODE of 802.11 wireless operations is the Access Point (AP). It is that interface which ACTS as an intermediary of a wired & wireless NETWORK; and all the ASSOCIATED wireless clients’ use this to exchange data with it.

12.

_________ is an old IEEE 802.11 standard from the year 1999.(a) WPA2(b) WPA3(c) WEP(d) WPAI had been asked this question in an internship interview.I would like to ask this question from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

Correct OPTION is (c) WEP

Explanation: The most widespread TYPES of wireless SECURITIES are Wired EQUIVALENT Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WEP is an old IEEE 802.11 standard from the YEAR 1999.

13.

Which among the following is the least strong security encryption standard?(a) WEP(b) WPA(c) WPA2(d) WPA3I have been asked this question by my school principal while I was bunking the class.This key question is from Cyber Security Types topic in portion Cyber Security Types of Cyber Security

Answer»

The correct ANSWER is (a) WEP

The explanation is: A prime branch of cyber-security is wireless security. The most WIDESPREAD types of wireless securities are Wired Equivalent Privacy (WEP), Wi-Fi PROTECTED Access (WPA), WPA2 and WPA3. WEP is notoriously weak encryption standard.

14.

____________________ is the anticipation of unauthorized access or break to computers or data by means of wireless networks.(a) Wireless access(b) Wireless security(c) Wired Security(d) Wired device appsThis question was posed to me by my college professor while I was bunking the class.The doubt is from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer»

The correct choice is (b) Wireless security

The explanation: Wireless security is the anticipation of unauthorized access or breaks to computers or data by means of wireless NETWORKS. The most widespread TYPES of wireless securities are WIRED Equivalent Privacy (WEP), Wi-Fi PROTECTED Access (WPA), WPA2 and recently released WPA3.

15.

Which among them has the strongest wireless security?(a) WEP(b) WPA(c) WPA2(d) WPA3The question was asked during an interview.Enquiry is from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer» CORRECT ANSWER is (d) WPA3

Explanation: The most EXTENSIVE TYPES of wireless securities are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WPA3 is the strongest and recently RELEASED.
16.

Which of the following is not a security issue for PDAs?(a) Password theft(b) Data theft(c) Reverse engineering(d) Wireless vulnerabilityThe question was asked in an online interview.This is a very interesting question from Cyber Security Types in division Cyber Security Types of Cyber Security

Answer»

Correct choice is (C) Reverse engineering

To explain: Reverse engineering is not an issue of PDA (PERSONAL Digital Assistant). Password theft, DATA theft, wireless VULNERABILITY exploitation, data corruption USING virus are some of them.

17.

BBProxy tool is used in which mobile OS?(a) Android(b) Symbian(c) Raspberry(d) BlackberryThe question was asked in an interview.My question is taken from Cyber Security Types topic in section Cyber Security Types of Cyber Security

Answer»

Correct choice is (d) Blackberry

Best explanation: BBPROXY (INSTALLED on blackberry phones) is the NAME of the tool used to conduct BLACKJACKING. What attackers do is they install BBProxy on USER’s blackberry and once the tool is activated it opens a covert channel between the hacker and the compromised host.

18.

Which of the following tool is used for Blackjacking?(a) BBAttacker(b) BBProxy(c) Blackburried(d) BBJackingThis question was addressed to me by my college director while I was bunking the class.The query is from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

The correct choice is (b) BBProxy

To explain I would SAY: BBProxy (INSTALLED on blackberry phones) is the name of the tool USED to conduct blackjacking. What attackers do is they install BBProxy on USER’s blackberry and once the tool is activated it opens a covert channel between the hacker and the compromised HOST.

19.

Try not to keep ________________ passwords, especially fingerprint for your smart-phone, because it can lead to physical hacking if you’re not aware or asleep.(a) Biometric(b) PIN-based(c) Alphanumeric(d) ShortI got this question in an internship interview.My enquiry is from Cyber Security Types topic in section Cyber Security Types of Cyber Security

Answer»

The CORRECT OPTION is (a) Biometric

The EXPLANATION is: Try not to keep biometric passwords, especially fingerprint for your smart-phone containing very confidential data, because anyone can do physical hacking if you’re not AWARE or asleep.

20.

Activate _____________ when you’re required it to use, otherwise turn it off for security purpose.(a) Flash Light(b) App updates(c) Bluetooth(d) RotationI got this question in a national level competition.Query is from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer» CORRECT answer is (c) Bluetooth

For EXPLANATION I WOULD SAY: Activate Bluetooth when you’re required it to use, otherwise turn it off for security purpose. This is because; there are various TOOLS and vulnerabilities that may gain access to your smart-phone using Bluetooth.
21.

App permissions can cause trouble as some apps may secretly access your memory card or contact data.(a) True(b) FalseI got this question by my college director while I was bunking the class.Asked question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

Correct option is (a) True

Explanation: App PERMISSIONS can cause trouble as some apps may SECRETLY access your memory CARD or contact DATA. Almost all applications nowadays ask for such permission, so MAKE sure you do a proper survey on these apps before allowing such access.

22.

Hackers cannot do which of the following after compromising your phone?(a) Shoulder surfing(b) Accessing your voice mail(c) Steal your information(d) Use your app credentialsI have been asked this question during an internship interview.The question is from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer»

Right ANSWER is (a) SHOULDER surfing

For EXPLANATION: Shoulder surfing is done before COMPROMISING the mobile. So, hackers can steal your information; accessing your voice mail or use your APP credentials after compromising your smart-phone.

23.

Hackers cannot do which of the following after compromising your phone?(a) Steal your information(b) Rob your e-money(c) Shoulder surfing(d) SpyingThis question was addressed to me during an online exam.The origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»
24.

DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.(a) worms(b) virus(c) botnets(d) programsThis question was addressed to me during an interview.This question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

Correct OPTION is (C) BOTNETS

Explanation: Botnets on compromised mobile devices wait for instructions from their owner. After GETTING the owner’s instruction it LAUNCHES DDoS flood attack. This result in a failure in connecting calls or transmitting data.

25.

Mobile security is also known as ____________(a) OS Security(b) Wireless security(c) Cloud security(d) Database securityI had been asked this question in an internship interview.Asked question is from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

The correct option is (b) Wireless security

Explanation: Mobile security also known as wireless security is the PROTECTION of smart-phones, phablets, TABLETS, and other portable tech-devices, & the networks to which they CONNECT to, from threats & bugs.

26.

____________ is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the networks to which they connect to, from threats & bugs.(a) OS Security(b) Database security(c) Cloud security(d) Mobile securityThe question was asked in a national level competition.Enquiry is from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

Right ANSWER is (d) Mobile security

To EXPLAIN: Mobile security is the protection of smart-phones, phablets, tablets, and other PORTABLE tech-devices, & the networks to which they connect to, from threats & BUGS.

27.

____________ gets propagated through networks and technologies like SMS, Bluetooth, wireless medium, USBs and infrared to affect mobile phones.(a) Worms(b) Antivirus(c) Malware(d) Multimedia filesI got this question during an interview for a job.This interesting question is from Cyber Security Types in portion Cyber Security Types of Cyber Security

Answer» CORRECT option is (c) Malware

The best explanation: Malware GETS propagated through networks and technologies like SMS, Bluetooth, wireless MEDIUM, USBS and infrared to AFFECT mobile phones.
28.

Mobile Phone OS contains open APIs that may be _____________ attack.(a) useful for(b) vulnerable to(c) easy to(d) meant forI got this question during an interview for a job.The query is from Cyber Security Types topic in chapter Cyber Security Types of Cyber Security

Answer»

Right option is (b) VULNERABLE to

Explanation: Mobile phone operating systems CONTAIN OPEN APIs that or may be vulnerable to different ATTACKS. OS has a number of connectivity mechanisms through which ATTACKERS can spread malware.

29.

Which of the following is not an OS for mobile?(a) Palm(b) Windows(c) Mango(d) AndroidThis question was addressed to me in quiz.This key question is from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer» CORRECT answer is (c) Mango

To explain I WOULD say: A mobile/smart-phone operating system is SOFTWARE which ALLOWS smart-phones, TABLETS, phablets & other devices to run apps & programs within it. Palm OS, Windows OS, and Android OS are some of the examples of Mobile OS.
30.

Which of the following is not an appropriate way of targeting a mobile phone for hacking?(a) Target mobile hardware vulnerabilities(b) Target apps’ vulnerabilities(c) Setup Keyloggers and spyware in smart-phones(d) Snatch the phoneI have been asked this question in a national level competition.My question is based upon Cyber Security Types in portion Cyber Security Types of Cyber Security

Answer»

Right choice is (d) Snatch the phone

To elaborate: SNATCHING is not a type of hacking any smart-phone. TARGETING the hardware and application LEVEL vulnerabilities and setting some keylogger or spyware in the TARGET mobile can help get valuable INFO about the victim.

31.

____________ is an application which now comes built-in Windows OS & it allows Windows users to encrypt all drive for security purpose.(a) MS Windows Defender(b) MSE(c) BitLocker(d) MS OfficeThis question was posed to me in examination.I need to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer»

Correct choice is (C) BitLocker

The best I can EXPLAIN: BitLocker is an application which now comes as built-in Windows OS and it allows Windows users to encrypt all drives for |security purpose. It CHECKS for TPM STATUS whether activated or not.

32.

A __________ is a dedicatedly designed chip on an endpoint device which stores RSA encryption keys particular to the host system for the purpose of hardware authentication.(a) Trusted Platform Mode(b) Trusted Protocol Module(c) Trusted Privacy Module(d) Trusted Platform ModuleThis question was addressed to me in my homework.I need to ask this question from Cyber Security Types topic in section Cyber Security Types of Cyber Security

Answer»

The correct option is (d) Trusted Platform Module

The best explanation: A Trusted Platform Module is a dedicatedly DESIGNED chip on an endpoint device which stores RSA ENCRYPTION keys particular to the host system for the purpose of hardware AUTHENTICATION.

33.

TPM is abbreviated as ____________(a) Trusted Platform Mode(b) Trusted Platform Module(c) Trusted Privacy Module(d) True Platform ModuleThe question was posed to me in an interview for internship.My question is from Cyber Security Types topic in section Cyber Security Types of Cyber Security

Answer» CORRECT choice is (B) TRUSTED Platform Module

Easiest explanation: Port knocking is quite an esoteric process for preventing session CREATION through a particular port. Port knocking is not presently used by default in any STACK, but soon patches will come to allow the use of knocking protocols.
34.

The ______________ account and the __________ account have the same file privileges, but their working and functionalities have difference.(a) system, administrator(b) system, user(c) group, user(d) user, administratorThe question was asked in exam.My query is from Cyber Security Types in division Cyber Security Types of Cyber Security

Answer» CORRECT choice is (a) system, administrator

For explanation I would say: The system ACCOUNT and the administrator account have the same FILE privileges, but their working and functionalities have a difference. Actually, the system account is used by the OS & by services which run under Windows. And, administrator account gives the USER full CONTROL to their files, directories, services.
35.

________________ is an anti-malware tool found in newer OS which is designed for protecting computers from viruses, spyware & other malware.(a) Norton Antivirus(b) Windows Defender(c) Anti-malware(d) Microsoft Security EssentialsI got this question in an international level competition.My question is taken from Cyber Security Types in chapter Cyber Security Types of Cyber Security

Answer»

The correct option is (b) Windows Defender

Best explanation: Windows Defender is an anti-malware tool found in NEWER OS which is designed for PROTECTING computers from VIRUSES, spyware & other malware. It COMES built-in with Windows 8 & Windows 10.

36.

The _______________ is a security app by Microsoft which is a built-in one into Windows OS that is designed to filter network data from your Windows system & block harmful communications or the programs which are initiating them.(a) Windows Security Essentials(b) Windows Firewall(c) Windows app blocker(d) Windows 10This question was addressed to me in final exam.Question is from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

Correct CHOICE is (b) Windows Firewall

To elaborate: The Windows Firewall is a security app by Microsoft which is a built-in one into Windows OS that is designed to FILTER network data from your Windows system & block harmful communications or the PROGRAMS which are initiating them.

37.

_____________ are essential because they frequently comprises of critical patches to security holes.(a) System software(b) Utility Software(c) Software executables(d) Software updatesI had been asked this question at a job interview.Origin of the question is Cyber Security Types in portion Cyber Security Types of Cyber Security

Answer»

Right CHOICE is (d) Software updates

Easiest explanation: Software updates are ESSENTIAL because they frequently comprise critical patches to security HOLES. In FACT, a lot of HARMFUL malware attacks can be stopped with official updates from vendors.

38.

As a backup for securing your device, it is necessary to create a _____________(a) backup point(b) copy of files in separate drives(c) copy of files in the same drives(d) restore pointThis question was posed to me during an interview for a job.Origin of the question is Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer» CORRECT answer is (d) restore POINT

Easiest explanation: As a backup for securing your DEVICE, it is necessary to CREATE a restore point so that you can roll-back all the changes and programs installed by restoring the system to the state before those changes.
39.

Find out, select & uninstall all ________________ programs from your computer.(a) useful(b) pre-installed(c) unwanted(d) utilityThe question was posed to me in quiz.I need to ask this question from Cyber Security Types in section Cyber Security Types of Cyber Security

Answer»

Correct choice is (c) unwanted

Best explanation: Find out, select & uninstall all unwanted programs from your computer to maintain security. At times, there are some programs that get installed with useful APPLICATIONS as separate programs or as COMPLEMENTARY programs. If you’re not USING those programs or don’t know about their usage and from where they came, it can be a MALWARE ALSO.

40.

Most computers have BIOS which can be configured so that it can ask for a password once the system starts.(a) True(b) FalseThis question was posed to me by my college director while I was bunking the class.This is a very interesting question from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

The CORRECT option is (a) True

Explanation: Most computers have BIOS which can be configured so that it can ask for a password once the system starts. It is the next level of SECURITY where the password is SET in the CMOS.

41.

BIOS is abbreviated as _______________(a) Basic Input Output Server(b) Basic Internet Output Systems(c) Basic Input Output System(d) Battery-based Input Output SystemThis question was posed to me in class test.Query is from Cyber Security Types topic in division Cyber Security Types of Cyber Security

Answer»

Right OPTION is (c) Basic Input Output System

The explanation is: BIOS (Basic Input Output System) passwords are next level of security. BIOS is an essential part of your system & comes with it as you bring the computer home where the password gets stored in CMOS which KEEPS on RUNNING EVEN after the PC gets shut down.

42.

__________ passwords are next level of security.(a) BIOS(b) CMOS(c) SMOS(d) BOISI had been asked this question by my college professor while I was bunking the class.Enquiry is from Cyber Security Types topic in portion Cyber Security Types of Cyber Security

Answer»

The correct CHOICE is (a) BIOS

The best explanation: BIOS PASSWORDS are next level of security where the password is set in the CMOS (which is a tiny battery) CHIP on the motherboard, which keeps on running even after the PC is turned off.

43.

Which of the following is not an example of non-technical attack techniques?(a) Shoulder surfing(b) Keyboard sniffing(c) Phishing(d) Social engineeringThe question was asked during an online interview.This interesting question is from Password Cracking and Security Measures in section Cyber Security Types of Cyber Security

Answer» CORRECT choice is (c) Phishing

The best explanation: In the non-technical type of attacks, it is not REQUIRED to have any technical knowledge to ATTACK your target victim. Examples of such types of attacks are shoulder surfing, keyboard SNIFFING, and social engineering.
44.

_____________ are based on dictionary attack techniques where the dictionary attack is mixed with some numerals and special symbols.(a) Syllable attack(b) Rule-based attack(c) Offline attack(d) Hybrid attackThe question was asked in a job interview.I want to ask this question from Password Cracking and Security Measures topic in portion Cyber Security Types of Cyber Security

Answer»

The CORRECT option is (d) Hybrid attack

The best I can explain: Hybrid attack is a TYPE of OFFLINE attack which is based on dictionary attack METHODS. In such types of ATTACKS, the dictionary attack is mixed with some numerals and special symbols.

45.

_______________ are based on dictionary attack techniques.(a) Hybrid attacks(b) Network attacks(c) TCP attacks(d) Database attacksI have been asked this question in an online interview.Origin of the question is Password Cracking and Security Measures in division Cyber Security Types of Cyber Security

Answer»

The correct option is (a) Hybrid attacks

Best explanation: Hybrid attacks are based on dictionary ATTACK techniques. In such TYPES of attacks, the dictionary attack is mixed with some numerals and SPECIAL SYMBOLS.

46.

Attackers can use the _______________ when he/she gets some information or hint regarding password he/she wants to crack.(a) Syllable attack(b) Rule-based attack(c) Offline attack(d) Hybrid attackI had been asked this question by my school principal while I was bunking the class.This intriguing question comes from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security

Answer»

The CORRECT option is (b) Rule-based attack

For explanation I would say: Attackers can use the rule-based attack when he/she gets some INFORMATION or hint regarding password he/she wants to crack. Examples of such SCENARIOS are LIKE: hacker knows about the type of password, or size or what type of DATA it might contain.

47.

____________ attack is a combination of Dictionary attack & brute force attack.(a) Syllable(b) Syllabi(c) Database(d) PhishingI got this question in examination.My question is from Password Cracking and Security Measures in portion Cyber Security Types of Cyber Security

Answer»

Correct option is (a) Syllable

Best explanation: Syllable attack is a combination of Dictionary attack & brute FORCE attack. This technique MAY be implemented when the password is a non-existing word and ATTACKER tries some techniques to crack it.

48.

A _____________ attack one of the simplest processes of gaining access to any password-protected system.(a) Clickjacking(b) Brute force(c) Eavesdropping(d) WaterholeThis question was addressed to me in exam.Enquiry is from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security

Answer»

Right choice is (b) Brute FORCE

The EXPLANATION: A brute force is the SIMPLEST process of gaining access to any password-protected system. It tries a VARIETY of combinations of USERNAMES & passwords again and again until it cracks it or password matches.

49.

The hybrid attack is a combination of dictionary attack followed by inserting entropy & performs brute force.(a) True(b) FalseThis question was addressed to me during an interview for a job.The doubt is from Password Cracking and Security Measures in chapter Cyber Security Types of Cyber Security

Answer»

Right choice is (a) True

The BEST I can EXPLAIN: A HYBRID attack is a combination of both brute force attack & dictionary attack. So, while a dictionary attack would comprise a WORDLIST of PASSWORDS, the brute force attack would be functional for each possible password in the given list.

50.

Brute force attack is ______________(a) fast(b) inefficient(c) slow(d) complex to understandThis question was posed to me in an interview for internship.My enquiry is from Password Cracking and Security Measures in division Cyber Security Types of Cyber Security

Answer»

Right choice is (c) SLOW

For explanation: A brute force is the simplest process of gaining ACCESS to any password-protected system. It tries a variety of combinations of USERNAMES & PASSWORDS again and again until it cracks it or password MATCHES. But it is comparatively slow.