ExamGecko
Question list
Search
Search

Related questions











Question 147 - 212-81 discussion

Report
Export

Which of the following techniques is used (other than brute force) to attempt to derive a key?

A.
Cryptography
Answers
A.
Cryptography
B.
Cryptoanalysis
Answers
B.
Cryptoanalysis
C.
Password cracking
Answers
C.
Password cracking
D.
Hacking
Answers
D.
Hacking
Suggested answer: B

Explanation:

Cryptoanalysis

https://en.wikipedia.org/wiki/Cryptanalysis

Cryptanalysis is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

asked 18/09/2024
Martin Lundgren
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first