New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.18 Exam - Topic 4 Question 103 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 103
Topic #: 4
[All S90.18 Questions]

The messages exchanged between two services are kept confidential by using symmetric encryption. The security specialist is quite strict about making sure that no attacker is able to intercept and decipher messages sent between these two services. As a result, periodic audits are conducted in order to ensure that shared keys are always kept confidential. A single shared key has been in use for quite some time now. The security specialist was confident that all keys were well guarded, but just recently their security was compromised. How is this possible given that the shared key was never lost?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Maryln
3 months ago
Comparing messages over time can definitely expose the key.
upvoted 0 times
...
Felix
3 months ago
They probably cracked the algorithm. That's a classic move.
upvoted 0 times
...
Lisbeth
3 months ago
Wait, how did they even get the key if it was never lost?
upvoted 0 times
...
Lucille
4 months ago
Totally agree, using the same key for too long is risky!
upvoted 0 times
...
Theresia
4 months ago
Symmetric encryption isn't great for long-term use.
upvoted 0 times
...
Adelina
4 months ago
I feel like the attackers could have figured out the encryption algorithm, but I’m not confident that alone would lead to the key being compromised.
upvoted 0 times
...
Sonia
4 months ago
This reminds me of a practice question where the attackers exploited the same key being reused. I wonder if that's the case here too?
upvoted 0 times
...
Jenise
4 months ago
I'm not entirely sure, but I think if the same key is used for too long, it can become vulnerable to attacks. Could that be what happened here?
upvoted 0 times
...
Marci
5 months ago
I remember studying that symmetric keys should be rotated regularly to maintain security. Maybe that's why the key was compromised?
upvoted 0 times
...
Frederica
5 months ago
Ah, I see what's going on. The shared key was likely compromised through cryptanalysis, even though it was never physically lost. Option D seems the most plausible explanation here.
upvoted 0 times
...
Wade
5 months ago
This seems like a classic case of key compromise due to long-term use of the same key. The security specialist should have rotated the keys more frequently. I'll go with option C.
upvoted 0 times
...
Wilbert
5 months ago
I'm a bit confused here. Symmetric encryption is supposed to be secure if the key is kept confidential. How could the attackers have obtained the key without it being lost? Option B seems like the most likely explanation.
upvoted 0 times
...
Talia
5 months ago
Okay, let's see. If the shared key was never lost, then the issue must be with how it was used or managed over time. I'm leaning towards option C.
upvoted 0 times
...
Monroe
5 months ago
Hmm, this is a tricky one. I'll need to think through the key management and encryption details carefully to figure out the right answer.
upvoted 0 times
...
Fatima
1 year ago
D sounds plausible. If the attackers got hold of some private keys used in the past, they might have been able to reverse-engineer the shared key. Security is hard, even for the pros.
upvoted 0 times
...
Brendan
1 year ago
Haha, the security specialist must have been asleep at the wheel! Didn't they know that shared keys need to be rotated regularly? This is Crypto 101, folks.
upvoted 0 times
Rozella
1 year ago
C) Because the same shared key was used for a long time, attackers were able to obtain the key by comparing messages sent between the two services.
upvoted 0 times
...
Ramonita
1 year ago
B) The attackers somehow figured out which encryption algorithm was used. As a result, they were able to decipher the messages.
upvoted 0 times
...
Lillian
1 year ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
...
Nelida
1 year ago
Maybe we should have replaced the shared key with asymmetric encryption sooner.
upvoted 0 times
...
Merilyn
1 year ago
I think the attackers must have somehow obtained the key by comparing messages.
upvoted 0 times
...
Ettie
1 year ago
I can't believe the shared key was compromised!
upvoted 0 times
...
Mattie
1 year ago
Hmm, I don't know. Symmetric encryption should be replaced periodically, but I'm not sure that's the issue here. Maybe the attackers found a way to crack the algorithm itself?
upvoted 0 times
Alica
1 year ago
C) Because the same shared key was used for a long time, attackers were able to obtain the key by comparing messages sent between the two services.
upvoted 0 times
...
Buffy
1 year ago
B) The attackers somehow figured out which encryption algorithm was used. As a result, they were able to decipher the messages.
upvoted 0 times
...
Stefania
1 year ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
...
Glendora
1 year ago
I think the answer is C. Using the same shared key for a long time makes it vulnerable to attacks like known-plaintext attacks. The attackers could have compared messages to deduce the key.
upvoted 0 times
Viola
1 year ago
D) The shared key was decoded by the attackers using algorithms from related private keys used during prior message exchanges.
upvoted 0 times
...
Stevie
1 year ago
C) Because the same shared key was used for a long time, attackers were able to obtain the key by comparing messages sent between the two services.
upvoted 0 times
...
Jerry
1 year ago
B) The attackers somehow figured out which encryption algorithm was used. As a result, they were able to decipher the messages.
upvoted 0 times
...
Marg
1 year ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
Lourdes
1 year ago
D) The shared key was decoded by the attackers using algorithms from related private keys used during prior message exchanges.
upvoted 0 times
...
Rocco
1 year ago
C) Because the same shared key was used for a long time, attackers were able to obtain the key by comparing messages sent between the two services.
upvoted 0 times
...
Margarett
1 year ago
B) The attackers somehow figured out which encryption algorithm was used. As a result, they were able to decipher the messages.
upvoted 0 times
...
Ahmed
1 year ago
A) Symmetric encryption is not intended for long-term use. It needs to be replaced with asymmetric encryption after some time.
upvoted 0 times
...
...

Save Cancel