New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 3 Question 97 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 97
Topic #: 3
[All ISSAP Questions]

Which of the following encryption modes can make protocols without integrity protection even more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Luann
3 months ago
Cipher block chaining can help with that, right?
upvoted 0 times
...
Malcom
3 months ago
Yup, ECB is a no-go for security!
upvoted 0 times
...
Ivan
3 months ago
Wait, are we sure about that? Seems too simple.
upvoted 0 times
...
Willodean
4 months ago
I agree, ECB is super weak for that reason.
upvoted 0 times
...
Gary
4 months ago
Definitely ECB mode! Each block is independent.
upvoted 0 times
...
Alecia
4 months ago
I’m a bit confused, but I remember that Output Feedback mode also has some vulnerabilities. Still, I lean towards ECB for this question.
upvoted 0 times
...
Billi
4 months ago
I recall practicing a question about encryption modes, and I think ECB was mentioned as being weak. It seems like the right choice here.
upvoted 0 times
...
Doyle
4 months ago
I'm not entirely sure, but I feel like Cipher Block Chaining mode is more secure against replay attacks since it uses chaining.
upvoted 0 times
...
Nieves
5 months ago
I think it might be Electronic Codebook mode because I remember it doesn't use an initialization vector, which could lead to patterns being repeated.
upvoted 0 times
...
Ludivina
5 months ago
This question is testing our understanding of how different encryption modes can impact security. I'll need to think carefully about the implications of each mode.
upvoted 0 times
...
Jules
5 months ago
Okay, let me carefully consider the details of each encryption mode. I want to make sure I select the right answer.
upvoted 0 times
...
Milly
5 months ago
Aha, I know the answer to this one! It's option B, cipher block chaining mode.
upvoted 0 times
...
Tyra
5 months ago
Hmm, I'm a bit unsure about this. I'll have to review my notes on encryption modes to figure this out.
upvoted 0 times
...
Johnathon
5 months ago
This one seems tricky, but I think I can work through it. Let me think this through step-by-step.
upvoted 0 times
...
Lashawnda
9 months ago
Wait, is it me or does this question sound like it's straight out of a spy movie? I feel like I should be wearing a tuxedo while answering this.
upvoted 0 times
...
Earleen
9 months ago
D definitely seems like the right answer. I can't believe I almost fell for that tricky wording in the question!
upvoted 0 times
Van
8 months ago
D) Electronic codebook mode
upvoted 0 times
...
Aliza
8 months ago
C) Output feedback mode
upvoted 0 times
...
Kate
9 months ago
B) Cipher block chaining mode
upvoted 0 times
...
Arlene
9 months ago
A) Cipher feedback mode
upvoted 0 times
...
...
Florinda
10 months ago
Ugh, these encryption modes can be so confusing. I'm just hoping for a multiple-choice miracle on this one.
upvoted 0 times
Muriel
8 months ago
D) Electronic codebook mode
upvoted 0 times
...
Kerry
8 months ago
C) Output feedback mode
upvoted 0 times
...
Ceola
8 months ago
B) Cipher block chaining mode
upvoted 0 times
...
Ahmed
9 months ago
A) Cipher feedback mode
upvoted 0 times
...
...
Beckie
10 months ago
Haha, I bet the exam writers were just waiting to trick us with that one. Good thing I studied hard for this!
upvoted 0 times
Fanny
9 months ago
D) Electronic codebook mode
upvoted 0 times
...
Murray
9 months ago
C) Output feedback mode
upvoted 0 times
...
Paulina
10 months ago
B) Cipher block chaining mode
upvoted 0 times
...
Nieves
10 months ago
A) Cipher feedback mode
upvoted 0 times
...
...
Gene
11 months ago
I agree with Jose, Electronic codebook mode makes protocols more susceptible to replay attacks.
upvoted 0 times
...
Nickolas
11 months ago
I think the answer is D. Electronic codebook mode, since it encrypts each block independently, making it vulnerable to replay attacks.
upvoted 0 times
Tamie
9 months ago
D) Electronic codebook mode
upvoted 0 times
...
Freida
10 months ago
C) Output feedback mode
upvoted 0 times
...
Armando
10 months ago
B) Cipher block chaining mode
upvoted 0 times
...
Peter
10 months ago
A) Cipher feedback mode
upvoted 0 times
...
...
Clay
11 months ago
I disagree, I believe the correct answer is B) Cipher block chaining mode.
upvoted 0 times
...
Jose
11 months ago
I think the answer is D) Electronic codebook mode.
upvoted 0 times
...

Save Cancel