ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 31 - CISSP-ISSAP discussion

Report
Export

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not thenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?

A.
Blowfish
Answers
A.
Blowfish
B.
Twofish
Answers
B.
Twofish
C.
RSA
Answers
C.
RSA
D.
Diffie-Hellman
Answers
D.
Diffie-Hellman
Suggested answer: D
asked 18/09/2024
Linda Müller
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first