(ISC)2(ISC)2
CERTIFIED-IN-CYBERSECURITY · Question #783
CERTIFIED-IN-CYBERSECURITY Question #783: Real Exam Question with Answer & Explanation
The correct answer is B: Trying every possible key to, over time, break any encryption.. See the full explanation below for the reasoning.
Security Principles
Question
When an attacker is using a brute force attack to break a password, what are they doing?
Options
- ALooking at the hash values and comparing it to thousands or millions of pre-calculated hashes.
- BTrying every possible key to, over time, break any encryption.
- CLooking at common letter frequency to guess the plaintext.
- DTrying to recover the key without breaking the encryption.
Topics
#Brute Force Attack#Password Attack#Cyberattack Methods
Community Discussion
No community discussion yet for this question.