New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 5 Question 65 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 65
Topic #: 5
[All ISSAP Questions]

In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?

Show Suggested Answer Hide Answer
Suggested Answer: D

biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming

more common in the business environment. It is the most secure method of authentication.

Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics

authentication. Username and password can be intercepted.

Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.

Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is

not prompted for credentials.


Contribute your Thoughts:

0/2000 characters
Devorah
4 months ago
Really? I didn't know that!
upvoted 0 times
...
Sherell
4 months ago
Wait, are we sure it's not a ciphertext only attack?
upvoted 0 times
...
Caitlin
4 months ago
Chosen ciphertext is also a possibility, but not this one.
upvoted 0 times
...
Ira
4 months ago
I thought it was a known plaintext attack.
upvoted 0 times
...
Annice
4 months ago
It's definitely a chosen plaintext attack!
upvoted 0 times
...
Tess
5 months ago
I feel like the chosen ciphertext attack might be the answer, but I need to double-check if it matches the description given in the question.
upvoted 0 times
...
Ira
5 months ago
The known plaintext attack sounds familiar, but I’m uncertain if it specifically requires the same encryption algorithm.
upvoted 0 times
...
Edison
5 months ago
I remember practicing with a question about ciphertext only attacks, but I can't recall if that one involves obtaining encrypted messages directly.
upvoted 0 times
...
Tabetha
5 months ago
I think a chosen plaintext attack is when the attacker can choose the plaintext to be encrypted, but I'm not sure if that's the right answer here.
upvoted 0 times
...
Gracia
5 months ago
I'm pretty sure the default interval for BFD packets is 1 second, so I'll go with option A.
upvoted 0 times
...
Makeda
5 months ago
I'm confident I can solve this. The answer is to create users in each database and configure the database firewall to restrict access.
upvoted 0 times
...
Delisa
5 months ago
I think all staff model HMOs are closed panel, but I'm not sure if the ambulatory care facilities part is correct or not.
upvoted 0 times
...
Jerry
5 months ago
Okay, I think I've got it. The supplier is recommending a temporary solution to the problem, which is not a permanent fix. That sounds like a workaround to me.
upvoted 0 times
...
Clay
5 months ago
I feel like LACP is the right choice, probably mode active. But I get confused between LACP and PAgP sometimes...
upvoted 0 times
...
Lachelle
9 months ago
Haha, this is a classic crypto question. I'm going with B) Ciphertext only attack. I mean, come on, who doesn't love a good old-fashioned brute force attack?
upvoted 0 times
...
Delisa
9 months ago
I'm leaning towards C) Chosen ciphertext attack. The attacker gets to choose the ciphertext and see how the system responds, which could help them figure out the encryption algorithm.
upvoted 0 times
Cassi
8 months ago
True, with known plaintext, the attacker has access to both the plaintext and ciphertext.
upvoted 0 times
...
Fanny
8 months ago
But what about D) Known plaintext attack? That also seems like a viable option.
upvoted 0 times
...
Izetta
8 months ago
I agree, it allows the attacker to manipulate the ciphertext.
upvoted 0 times
...
Starr
8 months ago
I think C) Chosen ciphertext attack is a good choice.
upvoted 0 times
...
...
Bev
9 months ago
I'm pretty sure it's D) Known plaintext attack. If the attacker has some of the original plaintext, they can use that to try and crack the encryption algorithm.
upvoted 0 times
...
Ethan
10 months ago
Hmm, this one's tricky. I think the answer is B) Ciphertext only attack, since the attacker only has access to the encrypted messages, not the original plaintext.
upvoted 0 times
Lamar
8 months ago
I agree with you, it's B) Ciphertext only attack.
upvoted 0 times
...
Frederica
8 months ago
I believe it's C) Chosen ciphertext attack.
upvoted 0 times
...
Isabelle
8 months ago
I think the answer is A) Chosen plaintext attack.
upvoted 0 times
...
...
Shasta
11 months ago
I'm not sure, but I think it might be C) Chosen ciphertext attack. Can someone explain why it's not that?
upvoted 0 times
...
Juliann
11 months ago
I agree with Madalyn, because in chosen plaintext attack, the attacker can obtain encrypted messages with the same encryption algorithm.
upvoted 0 times
...
Madalyn
11 months ago
I think the answer is A) Chosen plaintext attack.
upvoted 0 times
...

Save Cancel