Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 2 Question 98 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 98
Topic #: 2
[All ISSAP Questions]

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Leatha
4 days ago
Hmm, the man-in-the-middle vulnerability points to Diffie-Hellman. I'm going with D.
upvoted 0 times
...
Kenneth
16 days ago
I believe RSA would be a better choice for secure key exchange.
upvoted 0 times
...
Gary
18 days ago
I agree with Rosio, Diffie-Hellman is vulnerable to man-in-the-middle attacks.
upvoted 0 times
...
Rosio
20 days ago
I think the server is using Diffie-Hellman.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77