9.4.3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is a mathematical attack that targets the complexity of a cryptosystem's algorithm?

Analytic attack

If two different messages or files produce the same hashing digest, then a collision has occurred. Which form of cryptographic attack exploits this condition?

Birthday attack

Which of the following attacks typically takes the longest amount of time to complete?

Brute force attack

Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plaintext to see the resulting ciphertext. Which type of attack is this?

Chosen plaintext

Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt or a local copy of a security accounts database?

Dictionary

Which of the following password attacks adds appendages to known dictionary words?

Hybrid

Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?

Implementation attack

When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?

Key clustering

n which type of attack does the attacker have access to both the plaintext and the resulting cipher text, but does ot have the ability to encrypt the plain text?

Known plaintext

Which of the following is an example of a statistical attack against a cryptosystem?

O Exploiting a computer's inability to produce random numbers

Which of the following best describes a side-channel attack?

O The attack is based on information gained from the physical implementation of a cryptosystem.

Why are brute force attacks always successful?

O They test every possible valid combination.

If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user's login credentials, which of the following is true? (Select two.)

The discovered password will allow the attacker to log in as the user, even if the discovered password is not the same as the user's password. A collision was discovered.

Which of the following is not a countermeasure against dictionary attacks?

Using short passwords


Ensembles d'études connexes

Human Anatomy and Physiology CHAPTER 2, Human anatomy and physiology Exam 3, Human Anatomy and Physiology Tissue Review, Human Anatomy and Physiology Review, Essentials of Human Anatomy and Physiology, Human Anatomy and Physiology Lab, TEAS Human Ana...

View Set

Wrist and Hand Fractures/Pathologies

View Set

Chapter 4 Eukaryotic Cells and Microorganisms Whi

View Set

EMT Section 10A Exam: Chapter 27: Trauma, Chapter 28: Bleeding and Soft Tissue Injury, Chapter 29: Burns, Chapter 30 : Mus-skel Trauma and Nontruamatic Fractures, Chapter 31: Head Trauma

View Set