New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 6 Question 16 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 16
Topic #: 6
[All CPEH-001 Questions]

Which of the following are potential attacks on cryptography? (Select 3)

Show Suggested Answer Hide Answer
Suggested Answer: B, C, E

A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst chooses a ciphertext and causes it to be decrypted with an unknown key. Specific forms of this attack are sometimes termed 'lunchtime' or 'midnight' attacks, referring to a scenario in which an attacker gains access to an unattended decryption machine. In cryptography, a man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims. A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution (such as stream cipher attack).


Contribute your Thoughts:

0/2000 characters
Mary
4 months ago
Wait, are we sure about Known-Ciphertext Attack being a big deal?
upvoted 0 times
...
Galen
4 months ago
Totally agree with you, Noah!
upvoted 0 times
...
Barabara
4 months ago
One-Time-Pad Attack? Isn't that super rare?
upvoted 0 times
...
Noah
4 months ago
I think Man-in-the-Middle is the most common one.
upvoted 0 times
...
Galen
5 months ago
Chosen-Ciphertext Attack is definitely a real threat.
upvoted 0 times
...
Trina
5 months ago
I feel like the Known-Ciphertext Attack is a valid choice here, but I’m a bit confused about how it differs from the Chosen-Ciphertext Attack.
upvoted 0 times
...
Vincenza
5 months ago
The Man-in-the-Middle Attack definitely sounds familiar. I think we did a practice question on that, but I can't recall if it was specifically about cryptography.
upvoted 0 times
...
Ardella
5 months ago
I’m not entirely sure about the One-Time-Pad Attack. Was that one of the attacks we discussed in class, or was it more about the weaknesses of the one-time pad itself?
upvoted 0 times
...
Eladia
5 months ago
I remember studying the Chosen-Ciphertext Attack; it seems like a classic example of how attackers can exploit cryptographic systems.
upvoted 0 times
...
Latanya
5 months ago
I'm feeling pretty confident about this one. Based on the information provided, I think the answer is B. Connection Behavior, since that's the setting that controls how the ESA handles incoming email connections.
upvoted 0 times
...
Loren
5 months ago
Hmm, the placeholder attribute is throwing me off a bit. I'll need to review the JSF syntax for that.
upvoted 0 times
...
Janey
5 months ago
Alright, let me break this down. The question is asking for the three required elements in a Generation export definition. I'll carefully consider each option and select the three that I'm most confident about.
upvoted 0 times
...
Joseph
5 months ago
Hmm, I'm not sure - the Configuration Guide might also have some relevant details on procedures. I'll need to think this through carefully.
upvoted 0 times
...

Save Cancel