The attacker performs password cracking by directly communicating with the victim's machine.

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

The attacker performs password cracking by directly communicating with the victim's machine.

Explanation:
The situation describes an online attack where the attacker interacts with the victim’s system in real time to test credentials. This is considered active online because there is direct communication with the host during the password-cracking process, sending guesses and receiving live feedback (success, failure, prompts). In contrast, offline attacks involve stealing data such as password hashes and cracking them without contacting the live system, and passive online or non-electronic approaches don’t fit this real-time interactive scenario.

The situation describes an online attack where the attacker interacts with the victim’s system in real time to test credentials. This is considered active online because there is direct communication with the host during the password-cracking process, sending guesses and receiving live feedback (success, failure, prompts). In contrast, offline attacks involve stealing data such as password hashes and cracking them without contacting the live system, and passive online or non-electronic approaches don’t fit this real-time interactive scenario.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy