Sec 9.4 Cryptographic Attack

25 July 2022
4.7 (114 reviews)
14 test answers

Unlock all answers in this set

Unlock answers (10)
question
Which of the following is not a countermeasure against dictionary attacks? Using three or four different keyboard character types (lowercase, uppercase, numerals, and symbols) Using short passwords Avoiding common words Avoiding industry acronyms
answer
Using short passwords All too often, a short password is a simple common word. A dictionary attack is designed to quickly discover passwords that use common words. Dictionary attacks can be customized for the intended victim
question
Which of the following attacks typically takes the longest amount of time to complete?
answer
Brute force attack A brute force attack is a form of attack that attempts every possible key or password pattern for a message, login prompt, or security file.
question
Which of the following password attacks adds appendages to known dictionary words?
answer
Hybrid A hybrid attack adds appendages to known dictionary words (for example, 1password, password07, and p@ssword1).
question
Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?
answer
An implementation attack exploits implementation weaknesses, such as in software, the protocol, or the encryption algorithm.
question
Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plaintext to see the resulting ciphertext.
answer
Chosen plaintext A chosen plaintext attack is where the attacker chooses the plaintext to be encrypted. This event can occur when a worker steps away from the computer and the attacker sends a message and captures the resulting cipher text. The attacker can select plaintext that will produce clues to the encryption key used.
question
Which of the following best describes a side-channel attack?
answer
The attack is based on information gained from the physical implementation of a cryptosystem.
question
Which of the following is an example of a statistical attack against a cryptosystem?
answer
Exploiting a computer's inability to produce random numbers
question
In which type of attack does the attacker have access to both the plaintext and the resulting cipher text, but does not have the ability to encrypt the plain text?
answer
Known plaintext
question
Why are brute force attacks always successful?
answer
They test every possible valid combination.
question
If a birthday attack is successful, meaning the attacker discovers a password that generates the same hash as that captured from a user's login credentials, which of the following is true? (Select two.)
answer
The discovered password will allow the attacker to log in as the user, even if the discovered password is not the same as the user's password. A collision was discovered.
question
When an attacker decrypts an encoded message using a different key than was used during encryption, what type of attack has occurred?
answer
Key clustering
question
Which of the following is a mathematical attack that targets the complexity of a cryptosystem's algorithm?
answer
Analytical An analytic attack is a mathematical that targets the complexity of a cryptosystem's algorithm. The goal of an analytic attack is to break the algorithm
question
Which type of password attack employs a list of pre-defined passwords that it tries against a login prompt or a local copy of a security accounts database?
answer
Dictionary
question
If two different messages or files produce the same hashing digest, then a collision has occurred. Which form of cryptographic attack exploits this condition?
answer
birthday Attack