nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #783

CERTIFIED-IN-CYBERSECURITY Question #783: Real Exam Question with Answer & Explanation

The correct answer is B: Trying every possible key to, over time, break any encryption.. See the full explanation below for the reasoning.

Security Principles

Question

When an attacker is using a brute force attack to break a password, what are they doing?

Options

  • ALooking at the hash values and comparing it to thousands or millions of pre-calculated hashes.
  • BTrying every possible key to, over time, break any encryption.
  • CLooking at common letter frequency to guess the plaintext.
  • DTrying to recover the key without breaking the encryption.

Topics

#Brute Force Attack#Password Attack#Cyberattack Methods

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions