
CISSP Crash Course - Cryptanalytic Attacks
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack attempts to reduce the complexity of an encryption algorithm through algebraic manipulation?
Brute force attack
Analytic attack
Implementation attack
Side channel attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute force attack?
Monitoring information usage
Trying every possible combination
Exploiting statistical weaknesses
Manipulating the math of the algorithm
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a chosen plaintext attack, what does the attacker have access to?
Only the ciphertext
Only the plaintext
Both plaintext and ciphertext
The encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of a man in the middle attack?
To replay encrypted messages
To find a hash collision
To sit between communications and access unencrypted information
To decrypt messages using a known key
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a golden ticket attack in the context of Kerberos?
Creating a ticket using a stolen hash of the Kerberos system
Harvesting tickets to impersonate a user
Requesting an authentication request encrypted with the client password
Collecting ticket granting tickets for offline cracking
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware typically demand in exchange for unlocking files?
A password reset
A payment in cryptocurrency
A new encryption key
A software update
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the US Treasury Department, why might paying certain ransomware groups be illegal?
It violates privacy laws
It circumvents sanctions
It breaches data protection regulations
It supports cyber terrorism
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
3 questions
Colonial Pipeline Attack Shows Vulnerability of System, Says Energy Secretary
Interactive video
•
University
4 questions
Practical Cyber Hacking Skills for Beginners - Hashing
Interactive video
•
University
4 questions
Aramco's $75B Dividend Survives Oil Rout
Interactive video
•
University
6 questions
Addressing Inappropriate Behavior in the Workplace
Interactive video
•
University
6 questions
NYC Authorities Seek Person of Interest in Bombing
Interactive video
•
University
6 questions
Jeremy Corbyn Speech on Cyber Security
Interactive video
•
University
6 questions
Fundamentals of Object-Oriented Programming - C++ - Arrays and Structures
Interactive video
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University