Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 5 Question 65 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 65
Topic #: 5
[All ISSAP Questions]

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Show Suggested Answer Hide Answer
Suggested Answer: D

biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming

more common in the business environment. It is the most secure method of authentication.

Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics

authentication. Username and password can be intercepted.

Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.

Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is

not prompted for credentials.


Contribute your Thoughts:

Shasta
21 days ago
I'm not sure, but I think it might be C) Chosen ciphertext attack. Can someone explain why it's not that?
upvoted 0 times
...
Juliann
22 days ago
I agree with Madalyn, because in chosen plaintext attack, the attacker can obtain encrypted messages with the same encryption algorithm.
upvoted 0 times
...
Madalyn
24 days ago
I think the answer is A) Chosen plaintext attack.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77