9.4.3
Which of the following is a mathematical attack that targets the complexity of a cryptosystem's algorithm?
Analytic attack
If two different messages or files produce the same hashing digest, then a collision has occurred. Which form of cryptographic attack exploits this condition?
Birthday attack
Which of the following attacks typically takes the longest amount of time to complete?
Brute force attack
Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plaintext to see the resulting ciphertext. Which type of attack is this?
Chosen plaintext
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt or a local copy of a security accounts database?
Dictionary
Which of the following password attacks adds appendages to known dictionary words?
Hybrid
Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?
Implementation attack
When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?
Key clustering
n which type of attack does the attacker have access to both the plaintext and the resulting cipher text, but does ot have the ability to encrypt the plain text?
Known plaintext
Which of the following is an example of a statistical attack against a cryptosystem?
O Exploiting a computer's inability to produce random numbers
Which of the following best describes a side-channel attack?
O The attack is based on information gained from the physical implementation of a cryptosystem.
Why are brute force attacks always successful?
O They test every possible valid combination.
If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user's login credentials, which of the following is true? (Select two.)
The discovered password will allow the attacker to log in as the user, even if the discovered password is not the same as the user's password. A collision was discovered.
Which of the following is not a countermeasure against dictionary attacks?
Using short passwords