146k views
5 votes
Which of the following is NOT a password attack?a)choices b)Command and Control c)Brute Force d)Guessing e)Cracking

2 Answers

6 votes

Final answer:

The correct answer is b) Command and Control. Command and Control is not a password attack method, but rather a technique used by hackers to maintain control over compromised systems.

Step-by-step explanation:

The correct answer is b) Command and Control. Command and Control is not a password attack method, but rather a technique used by hackers to maintain control over compromised systems. The other options are all examples of password attacks:

  • a) Guessing involves attempting to guess the password using common words or personal information about the target.
  • c) Brute Force involves systematically trying every possible combination of characters until the correct password is found.
  • d) Cracking involves using software or algorithms to decrypt or uncover encrypted passwords.

User Mrkishi
by
8.2k points
5 votes

Command and Control is NOT a password attack. The Option B.

Command and Control refers to a technique used by cybercriminals to maintain control over compromised systems or networks. It involves establishing a connection or communication channel between an attacker's system and the compromised system to issue commands and receive data.

The password attack are:

  • Brute Force: In this attack, an attacker systematically tries all possible combinations of characters until the correct password is found. It's a time-consuming method but can be effective if the password is weak.
  • Guessing: This attack relies on the attacker making educated guesses about the password based on information about the target, such as their personal details, interests, or commonly used passwords.
  • Cracking: Password cracking involves using software or tools to attempt to decipher a password by exploiting vulnerabilities or weaknesses in the encryption or hashing algorithms used to protect the password.

So, Command and Control is a different type of cyber attack tactic and is not focused on directly compromising passwords which makes it the correct answer to the question.

User Mahesh M
by
8.1k points