The attacker performs password cracking by directly communicating with the victim's machine.

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

The attacker performs password cracking by directly communicating with the victim's machine.

Explanation:
The situation describes an online attack where the attacker interacts with the victim’s system in real time to test credentials. This is considered active online because there is direct communication with the host during the password-cracking process, sending guesses and receiving live feedback (success, failure, prompts). In contrast, offline attacks involve stealing data such as password hashes and cracking them without contacting the live system, and passive online or non-electronic approaches don’t fit this real-time interactive scenario.

The situation describes an online attack where the attacker interacts with the victim’s system in real time to test credentials. This is considered active online because there is direct communication with the host during the password-cracking process, sending guesses and receiving live feedback (success, failure, prompts). In contrast, offline attacks involve stealing data such as password hashes and cracking them without contacting the live system, and passive online or non-electronic approaches don’t fit this real-time interactive scenario.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy