New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 1 Question 56 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 56
Topic #: 1
[All ISSAP Questions]

In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?

Show Suggested Answer Hide Answer
Suggested Answer: C

This is used to find patterns in the cryptographic output that might uncover vulnerability or reveal a cryptographic key.

Answer option D is incorrect. In a ciphertext only attack, the attacker obtains encrypted messages that have been encrypted using the same

encryption algorithm. For example, the original version of WEP used RC4, and if sniffed long enough, the repetitions would allow a hacker to

extract the WEP key. Such types of attacks do not require the attacker to have the plaintext because the statistical analysis of the sniffed log

is enough.

Answer option A is incorrect. In a chosen ciphertext attack, the attacker can choose the ciphertext to be decrypted and can then analyze the

plaintext output of the event. The early versions of RSA used in SSL were actually vulnerable to this attack.

Answer option B is incorrect. In a known plaintext attack, the attacker should have both the plaintext and ciphertext of one or more

messages. These two items are used to extract the cryptographic key and recover the encrypted text.


Contribute your Thoughts:

0/2000 characters
Scarlet
4 months ago
Chosen ciphertext is the one where they get both, for sure.
upvoted 0 times
...
Daisy
4 months ago
Wait, are we sure about that? Seems tricky!
upvoted 0 times
...
Tasia
4 months ago
Chosen plaintext attack sounds right to me.
upvoted 0 times
...
Paris
4 months ago
I thought it was a Known plaintext attack.
upvoted 0 times
...
Tamera
4 months ago
It's definitely a Chosen ciphertext attack!
upvoted 0 times
...
Gianna
5 months ago
I'm leaning towards the ciphertext only attack, but I can't recall if that one involves picking any plaintext at all.
upvoted 0 times
...
Cassi
5 months ago
I feel like the chosen plaintext attack might be the right answer since it involves selecting the plaintext to see how it gets encrypted.
upvoted 0 times
...
Glynda
5 months ago
I remember practicing a question similar to this, and I think the known plaintext attack is when the attacker has both the plaintext and ciphertext, but that doesn't seem to fit here.
upvoted 0 times
...
Freida
5 months ago
I think the chosen ciphertext attack is about manipulating the ciphertext, but I'm not entirely sure if it involves copying the plaintext too.
upvoted 0 times
...
Juan
5 months ago
I'm a bit confused on the difference between RETs, FTRs, and DETs. I'll have to review my notes to make sure I understand the concepts.
upvoted 0 times
...
Josphine
5 months ago
I'm feeling confident on this one. HIPAA is designed to protect all forms of personally identifiable health data, whether it's paper, electronic, or even verbal. I'll select D - All of the above.
upvoted 0 times
...
Vincenza
5 months ago
Wait, I'm confused. Isn't it the other way around - that closed questions are more open-ended and open questions are more specific? I'll have to review my notes on this topic before answering.
upvoted 0 times
...
Heike
5 months ago
I have a vague memory of fishbone diagrams being more about root causes rather than net benefits. Is that right?
upvoted 0 times
...
Joesph
5 months ago
From what I recall, we did a practice question that hinted at the general settings in the tunnel-group. But now I'm not so sure...
upvoted 0 times
...
Earleen
5 months ago
I remember studying MTU settings, but I'm not entirely sure which option to pick for ACI Multi-Site.
upvoted 0 times
...

Save Cancel