Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 1 Question 56 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 56
Topic #: 1
[All ISSAP Questions]

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Show Suggested Answer Hide Answer
Suggested Answer: C

This is used to find patterns in the cryptographic output that might uncover vulnerability or reveal a cryptographic key.

Answer option D is incorrect. In a ciphertext only attack, the attacker obtains encrypted messages that have been encrypted using the same

encryption algorithm. For example, the original version of WEP used RC4, and if sniffed long enough, the repetitions would allow a hacker to

extract the WEP key. Such types of attacks do not require the attacker to have the plaintext because the statistical analysis of the sniffed log

is enough.

Answer option A is incorrect. In a chosen ciphertext attack, the attacker can choose the ciphertext to be decrypted and can then analyze the

plaintext output of the event. The early versions of RSA used in SSL were actually vulnerable to this attack.

Answer option B is incorrect. In a known plaintext attack, the attacker should have both the plaintext and ciphertext of one or more

messages. These two items are used to extract the cryptographic key and recover the encrypted text.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77