Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 4 Question 103 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 103
Topic #: 4
[All S90.18 Questions]

The messages exchanged between two services are kept confidential by using symmetric encryption. The security specialist is quite strict about making sure that no attacker is able to intercept and decipher messages sent between these two services. As a result, periodic audits are conducted in order to ensure that shared keys are always kept confidential. A single shared key has been in use for quite some time now. The security specialist was confident that all keys were well guarded, but just recently their security was compromised. How is this possible given that the shared key was never lost?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Fatima
6 days ago
D sounds plausible. If the attackers got hold of some private keys used in the past, they might have been able to reverse-engineer the shared key. Security is hard, even for the pros.
upvoted 0 times
...
Brendan
7 days ago
Haha, the security specialist must have been asleep at the wheel! Didn't they know that shared keys need to be rotated regularly? This is Crypto 101, folks.
upvoted 0 times
...
Nelida
10 days ago
Maybe we should have replaced the shared key with asymmetric encryption sooner.
upvoted 0 times
...
Merilyn
11 days ago
I think the attackers must have somehow obtained the key by comparing messages.
upvoted 0 times
...
Ettie
12 days ago
I can't believe the shared key was compromised!
upvoted 0 times
...
Mattie
16 days ago
Hmm, I don't know. Symmetric encryption should be replaced periodically, but I'm not sure that's the issue here. Maybe the attackers found a way to crack the algorithm itself?
upvoted 0 times
...
Glendora
22 days ago
I think the answer is C. Using the same shared key for a long time makes it vulnerable to attacks like known-plaintext attacks. The attackers could have compared messages to deduce the key.
upvoted 0 times
Marg
1 days ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
Lourdes
4 days ago
D) The shared key was decoded by the attackers using algorithms from related private keys used during prior message exchanges.
upvoted 0 times
...
Rocco
6 days ago
C) Because the same shared key was used for a long time, attackers were able to obtain the key by comparing messages sent between the two services.
upvoted 0 times
...
Margarett
9 days ago
B) The attackers somehow figured out which encryption algorithm was used. As a result, they were able to decipher the messages.
upvoted 0 times
...
Ahmed
10 days ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77