1.
Which of the following definitions would be correct regarding Eavesdropping?
Correct Answer
C. Listening or overhearing parts of a conversation
Explanation
Eavesdropping refers to the act of listening or overhearing parts of a conversation without the knowledge or consent of the parties involved. It typically involves secretly monitoring or intercepting communication to gain unauthorized access to information. This can be done through various means, such as wiretapping, surveillance devices, or hacking into communication channels. Eavesdropping is considered a breach of privacy and can be illegal in many jurisdictions.
2.
Which of the following access control models uses roles to determine access permissions?
Correct Answer
C. RBAC
Explanation
RBAC (Role-Based Access Control) is an access control model that uses roles to determine access permissions. In RBAC, users are assigned specific roles, and permissions are associated with these roles. This approach simplifies the management of access control by allowing administrators to assign permissions to roles rather than individual users. Users inherit the permissions associated with their assigned roles, making it easier to grant or revoke access as needed. This model is widely used in organizations to ensure efficient and secure access control.
3.
Given: John is a network administrator. He advises the server administrator of his company to implement whitelisting, blacklisting, closing-open relays and strong authentication techniques. Question: Which threat is being addressed?
Correct Answer
C. Spam
Explanation
The threat being addressed in this scenario is spam. John, the network administrator, suggests implementing techniques such as whitelisting, blacklisting, closing-open relays, and strong authentication to combat spam. These techniques help in filtering out unwanted and unsolicited emails, reducing the risk of spam reaching the company's servers and email accounts.
4.
Which of the following ports are typically used by email clients? (Select TWO)
Correct Answer(s)
C. 143
D. 110
Explanation
Port 143 is typically used by email clients for the Internet Message Access Protocol (IMAP), which allows users to retrieve and manage their emails on a mail server. Port 110 is used for the Post Office Protocol (POP3), another email retrieval protocol that allows users to download their emails from a mail server to their local device. These two ports are commonly used by email clients to establish a connection with the mail server and retrieve emails.
5.
Which of the following types of removable media is write-once and appropriate for archiving security logs?
Correct Answer
B. CD-R
Explanation
CD-R stands for Compact Disc-Recordable. It is a type of removable media that can be written on only once. Once data is written onto a CD-R, it cannot be erased or modified, making it suitable for archiving purposes, such as storing security logs. Tape, hard disks, and USB drives are not write-once media and can be modified or erased, making them less suitable for long-term archiving.
6.
Who is responsible for establishing access permissions to network resources in the DAC access control model?
Correct Answer
B. The owner of the resource.
Explanation
In the DAC (Discretionary Access Control) access control model, the owner of the resource is responsible for establishing access permissions to network resources. This means that the owner has the discretion to determine who can access the resource and what level of access they have. The system administrator may assist in managing these permissions, but ultimately it is the owner's responsibility to control access to their own resources.
7.
What does the DAC access control model use to identify the users who have permissions to a resource?
Correct Answer
C. Access Control Lists
Explanation
The DAC (Discretionary Access Control) access control model uses Access Control Lists (ACLs) to identify the users who have permissions to a resource. ACLs contain a list of users or groups and their corresponding access privileges, allowing or denying them access to specific resources. This model grants control to the resource owner, who can determine and modify the access rights for individual users or groups. The other options, such as predefined access privileges or roles and responsibilities, are not specifically associated with the DAC model.
8.
One of the below is a description for a password cracker, which one is it?
Correct Answer
C. A program that performs comparative analysis.
Explanation
The correct answer is "A program that performs comparative analysis." This is because a password cracker is a program specifically designed to analyze and compare different combinations of characters in order to guess or crack a password. It does not necessarily involve locating and reading a password file, providing software registration passwords or keys, or obtaining privileged access to the system.
9.
The concept that a web script is run in its own environment and cannot interfere with any other process is known as a:
Correct Answer
D. Sandbox
Explanation
The concept that a web script is run in its own environment and cannot interfere with any other process is known as a sandbox. In a sandbox environment, the web script is isolated and restricted from accessing or modifying other processes or data on the system. This provides a layer of security, as any malicious code or actions performed within the sandbox will not affect the rest of the system. Sandboxing is commonly used in web browsers and other software applications to protect against potential threats and vulnerabilities.
10.
How to test the integrity of a company's backup data?
Correct Answer
C. By restoring part of the backup
Explanation
To test the integrity of a company's backup data, one can restore a part of the backup. This involves selecting a portion of the backed-up data and restoring it to ensure that the data is recoverable and intact. By performing this test, the company can verify that the backup process is functioning correctly and that the data can be successfully restored if needed. This helps to ensure the reliability and effectiveness of the backup system in preserving the company's data.
11.
Most current encryption schemes are based on
Correct Answer
D. Algorithms
Explanation
Most current encryption schemes are based on algorithms. Algorithms are step-by-step procedures or formulas for solving a problem or accomplishing a task. In the context of encryption, algorithms are used to transform plaintext into ciphertext, making the data unreadable to unauthorized individuals. These algorithms ensure the security and confidentiality of sensitive information by using mathematical functions and complex calculations. They are designed to be resistant to attacks and provide a high level of encryption. Therefore, algorithms play a crucial role in modern encryption schemes.
12.
Human resource department personnel should be trained about security policy:
Correct Answer
A. Guidelines and enforcement.
Explanation
The human resource department personnel should be trained about security policy guidelines and enforcement because they are responsible for ensuring that employees are aware of and adhere to the organization's security policies. This includes educating employees about best practices, procedures, and protocols for maintaining a secure work environment. Additionally, HR personnel play a crucial role in enforcing these policies by monitoring employee compliance and taking appropriate disciplinary actions when necessary. By being trained in guidelines and enforcement, HR personnel can effectively contribute to the overall security of the organization.
13.
PKI to encrypt sensitive emails sent to an assistant. In addition to encrypting the body of the email, the executive wants to encrypt the signature so that the assistant can verify that the email actually came from the executive. Which asymmetric key should be used by the executive to encrypt the signature?
Correct Answer
B. Private
Explanation
The executive should use their private key to encrypt the signature. This is because in a PKI (Public Key Infrastructure) system, the executive's private key is used to encrypt the signature, while the assistant's public key is used to verify the signature. By encrypting the signature with their private key, the executive ensures that only someone with the corresponding public key (in this case, the assistant) can decrypt and verify the signature. This provides authentication and ensures that the email actually came from the executive.
14.
Which access control system allows the system administrator to establish access permissions to network resources?
Correct Answer
A. MAC
Explanation
MAC (Mandatory Access Control) is the correct answer because it is an access control system that enables the system administrator to establish access permissions to network resources. MAC uses a predefined set of rules and policies to determine access rights and permissions based on the classification level or security clearance of users and the sensitivity or classification level of the resources being accessed. This allows the system administrator to have granular control over who can access what resources, ensuring a higher level of security and confidentiality. DAC (Discretionary Access Control) and RBAC (Role-Based Access Control) are also access control systems, but they do not provide the same level of control as MAC.
15.
Why malware that uses virtualization techniques is difficult to detect?
Correct Answer
D. The malware may be running at a more privileged level than the antivirus software.
Explanation
Malware that uses virtualization techniques can be difficult to detect because it may be running at a more privileged level than the antivirus software. This means that the malware can operate at a lower level of the system, making it harder for the antivirus software to detect its presence. By running at a higher level of privilege, the malware can also potentially bypass or disable security measures that would normally detect and prevent its activities. This allows the malware to remain hidden and continue to carry out its malicious activities without being detected by traditional security measures.
16.
Social engineering attacks would be MOST effective in which of the following environments? (Select TWO).
Correct Answer(s)
C. A public building that has shared office space.
E. A company with a help desk whose personnel have minimal training.
Explanation
Social engineering attacks are most effective in environments where there is a lack of security awareness and controls. A public building with shared office space is vulnerable because it may have a large number of people with different levels of security knowledge, making it easier for attackers to exploit human vulnerabilities. Similarly, a company with a help desk whose personnel have minimal training is also susceptible to social engineering attacks as they may not have the necessary skills to recognize and respond to such attacks effectively.
17.
Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. A HIDS is installed to monitor which of following?
Correct Answer
C. System files
Explanation
A HIDS is installed to monitor system files. System files are crucial components of an operating system, and any unauthorized changes or modifications to these files can indicate a potential security breach or intrusion. By monitoring system files, a HIDS can detect and alert administrators about any suspicious activity or unauthorized access attempts, allowing them to take appropriate action to protect the system and network from further compromise.
18.
In a classified environment, a clearance into a Top Secret compartment only allows access to certain information within that compartment. This is known as
Correct Answer
B. Need to know.
Explanation
In a classified environment, individuals with a clearance into a Top Secret compartment are only granted access to specific information within that compartment based on their "need to know." This means that access is strictly limited to individuals who require the information to perform their duties or tasks effectively. It ensures that sensitive information is only disclosed to those who have a legitimate need for it, maintaining the confidentiality and security of classified materials.
19.
Which of the below options would you consider as a program that constantly observes data traveling over a network?
Correct Answer
B. Sniffer
Explanation
A program that constantly observes data traveling over a network is called a sniffer. A sniffer is a tool that captures and analyzes network traffic, allowing users to monitor and inspect the data packets being transmitted. It can be used for various purposes, such as network troubleshooting, security analysis, and performance monitoring. By capturing and analyzing network packets, a sniffer provides valuable insights into the network's behavior and helps identify any potential issues or threats.
20.
After auditing file, which log will show unauthorized usage attempts?
Correct Answer
C. Security
Explanation
The correct answer is "Security". After auditing a file, the security log will show unauthorized usage attempts. This log keeps track of any security-related events such as failed login attempts, access violations, or unauthorized access attempts. It helps in identifying and investigating any potential security breaches or unauthorized activities within the system. The application, performance, and system logs may provide other useful information, but the security log specifically focuses on security-related events.
21.
Risk assessment is a common first step in a risk management process. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat (also called hazard). As a best practice, risk assessments should be based upon
which of the following?
Correct Answer
C. A quantitative measurement of risk, impact and asset value
Explanation
Risk assessments should be based on a quantitative measurement of risk, impact, and asset value. This means that the assessment should involve a numerical evaluation of the likelihood and potential consequences of a risk occurring, as well as the value of the assets that could be affected. This approach allows for a more objective and comprehensive understanding of the risks involved, which can then inform the development of effective risk management strategies.
22.
Choose the scheme or system used by PGP (Pretty Good Privacy) to encrypt data.
Correct Answer
A. Zombie
23.
Choose the option that details one of the primary benefits of using S/MIME (Secure Multipurpose Internet Mail Extension)?
Correct Answer
A. S/MIME allows users to send both encrypted and digitally signed e-mail messages.
Explanation
S/MIME allows users to send both encrypted and digitally signed e-mail messages, which ensures the confidentiality and integrity of the messages. Encryption protects the content of the email from being accessed by unauthorized individuals, while digital signatures verify the authenticity and integrity of the email, ensuring that it has not been tampered with during transit. This provides a secure communication channel for sensitive information, protecting it from interception and unauthorized access.
24.
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If the anti-malware software is purchased, which of the following is the expected net savings?
Correct Answer
B. $2,290
Explanation
By purchasing the anti-malware software for $5,000 per year, the call center can prevent 90% of the workstations from being compromised. If the workstations are compromised, it will take three hours to restore services for the 30 staff, resulting in a cost of $90 per hour per staff member. Without the software, there is a 90% chance of workstations being compromised, which means that there is a 10% chance of not needing to restore services for the staff. Therefore, the expected net savings can be calculated as: (90% * 30 * 3 * $90) - $5,000 = $2,290.
25.
The purpose of a DNS server is to enable people and applications to lookup records in DNS tables. Why implement security logging on a DNS server?
Correct Answer
A. To monitor unauthorized zone transfers
Explanation
Implementing security logging on a DNS server is necessary to monitor unauthorized zone transfers. This helps in detecting any unauthorized attempts to transfer DNS records from one server to another. By monitoring these transfers, administrators can identify and prevent any potential security breaches or unauthorized access to DNS information. It is an important security measure to ensure the integrity and confidentiality of DNS records.
26.
A small call center business decided to install an email system to facilitate communications in the office. As part of the upgrade the vendor offered to supply anti-malware software for a cost of $5,000 per year. The IT manager read there was a 90% chance each year that workstations would be compromised if not adequately protected. If workstations are compromised it will take three hours to restore services for the 30 staff. Staff members in the call center are paid $90 per hour. If determining the risk, which of the following is the annual loss expectancy (ALE)?
Correct Answer
D. $7,290
Explanation
The annual loss expectancy (ALE) can be calculated by multiplying the annual rate of occurrence (ARO) with the single loss expectancy (SLE). In this case, the ARO is 90% (0.9) as there is a 90% chance each year that workstations would be compromised. The SLE can be calculated by multiplying the cost of restoring services ($90 per hour * 3 hours * 30 staff) which equals $8,100. Therefore, the ALE is $8,100 * 0.9 = $7,290.
27.
Which security measures should be recommended while implementing system logging procedures?
Correct Answer
D. Perform hashing of the log files.
Explanation
Performing hashing of the log files is a recommended security measure while implementing system logging procedures. Hashing involves generating a unique hash value for each log file, which can be used to verify the integrity of the file. By comparing the hash value before and after transmission or storage, any unauthorized modifications or tampering can be detected. This ensures the reliability and authenticity of the log files, making them a valuable tool for forensic analysis and auditing purposes.
28.
Which of the following web vulnerabilities is being referred to when it receives more data than it is programmed to accept?
Correct Answer
A. Buffer Overflows.
Explanation
Buffer overflows occur when a program or application receives more data than it is programmed to accept, causing the excess data to overflow into adjacent memory locations. This can lead to the corruption of data, the execution of malicious code, and potential security vulnerabilities. In the context of web vulnerabilities, buffer overflows can be exploited by attackers to gain unauthorized access, manipulate data, or cause system crashes. Therefore, the correct answer is Buffer Overflows.
29.
Which of the following definitions BEST suit Java Applet?
Correct Answer
B. The client browser must have the ability to run Java applets in a virtual machine on the client
Explanation
Java Applet is a programming language that requires the client browser to have the capability to run Java applets in a virtual machine on the client. This definition emphasizes the necessity of the client browser to support Java applets in order to execute them properly.
30.
On the topic of comparing viruses and hoaxes, which statement is TRUE? Choose the best TRUE statement.
Correct Answer
A. Hoaxes can create as much damage as a real virus.
Explanation
Hoaxes can create as much damage as a real virus because they can spread misinformation and cause panic among users. They can also lead to wasted time and resources as people try to address the false threat. Additionally, hoaxes can undermine trust in legitimate virus warnings and make it harder for users to differentiate between real threats and false alarms. Therefore, it is important to take hoaxes seriously and not dismiss them as harmless pranks.
31.
Which of the following definitions BEST suit Buffer Overflow?
Correct Answer
A. It receives more data than it is programmed to accept.
Explanation
Buffer overflow occurs when a program or system receives more data than it is programmed to handle, causing the excess data to overflow into adjacent memory locations. This can lead to various security vulnerabilities, as the overflowed data can overwrite critical information or execute malicious code. Therefore, the definition "It receives more data than it is programmed to accept" best suits buffer overflow.
32.
An administrator wants to make sure that no equipment is damaged when encountering a fire or false alarm in the server room. Which type of fire suppression system should be used?
Correct Answer
A. Carbon Dioxide
Explanation
Carbon Dioxide is the correct answer because it is a highly effective fire suppression system for server rooms. Carbon Dioxide displaces oxygen, suffocating the fire and preventing it from spreading. It is non-conductive and leaves no residue, making it safe for electrical equipment. Deluge sprinkler systems release large amounts of water, which can cause damage to sensitive equipment. Hydrogen Peroxide and Wet pipe sprinkler systems are also not suitable for server rooms as they can cause damage or leave residue on equipment.
33.
When power must be delivered to critical systems, which of the following is a countermeasure?
Correct Answer
A. Backup generator
Explanation
A backup generator is a countermeasure that can be implemented to ensure that power is delivered to critical systems in the event of a power outage or failure. It serves as a secondary power source that can be activated automatically or manually when the primary power source is no longer available. This helps to minimize downtime and ensure that critical systems can continue to operate without interruption.
34.
A programmer plans to change the server variable in the coding of an authentication function for a proprietary sales application. Which process should be followed before implementing the new routine on the production application server?
Correct Answer
A. Change management
Explanation
Before implementing the new routine on the production application server, the programmer should follow the process of change management. Change management involves systematically planning, testing, and implementing changes to a system or software in order to minimize disruption and ensure that the changes are implemented correctly. This process helps to assess the impact of the change, identify any potential risks or issues, and ensure that appropriate documentation and communication are done to all stakeholders involved. By following change management, the programmer can ensure a smooth and controlled transition of the new routine into the production environment.
35.
The difference between identification and authentication is that:
Correct Answer
C. Authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials.
Explanation
Authentication is the process of verifying the validity of a set of credentials, such as a username and password, to ensure that the user is who they claim to be. On the other hand, identification is the process of confirming the identity of a user requesting credentials, which involves verifying their personal information or biometric data. Therefore, the correct answer is that authentication verifies a set of credentials while identification verifies the identity of a user requesting credentials.
36.
The main objective of risk management in an organization is to reduce risk to a level:
Correct Answer
D. The organization will accept.
Explanation
The main objective of risk management in an organization is to identify, assess, and mitigate risks. However, it is not always possible or practical to eliminate all risks entirely. In some cases, the cost of mitigating a risk may outweigh the potential impact of that risk. Therefore, the organization may choose to accept certain risks and focus on managing them rather than trying to eliminate them completely. This approach allows the organization to prioritize resources and efforts on risks that are more critical or have a higher potential impact.
37.
The FIRST step in creating a security baseline would be:
Correct Answer
D. Creating a security policy
Explanation
The first step in creating a security baseline is to create a security policy. A security policy outlines the guidelines and procedures that need to be followed to ensure the security of a system or network. It defines the objectives, rules, and responsibilities related to security measures. By creating a security policy, organizations can establish a framework for implementing security controls and procedures, which will help in identifying and addressing potential risks and vulnerabilities. Once the security policy is in place, other steps such as identifying the use case, installing software patches, and vulnerability testing can be carried out based on the guidelines provided in the policy.
38.
Which of the following logs shows when the workstation was last shutdown?
Correct Answer
D. System
Explanation
The System log is the correct answer because it records events related to the operating system, including system startup and shutdown. By checking the System log, one can find the timestamp of the last shutdown event, which indicates when the workstation was last shut down. The Security log focuses on security-related events, the DHCP log records DHCP server activity, and the Access log tracks access control events. None of these logs specifically indicate when the workstation was last shutdown.
39.
Which of the following logs shows when the workstation was last shutdown?
Correct Answer
D. System
Explanation
The System log shows when the workstation was last shutdown. This log contains information about system events, including startup and shutdown events. By analyzing the entries in the System log, one can determine the exact time and date of the most recent shutdown of the workstation.
40.
Which one of the following options overwrites the return address within a program to execute malicious code?
Correct Answer
A. Buffer overflow
Explanation
A buffer overflow is a type of vulnerability where a program writes data beyond the allocated buffer, overwriting adjacent memory. In the context of this question, a buffer overflow can be exploited to overwrite the return address of a program's function, causing it to execute malicious code instead of returning to its intended execution point. This allows an attacker to gain control of the program and potentially execute arbitrary commands or inject malware.
41.
Which of the following attacks are being referred to if packets are not connection-oriented and do not require the synchronization process?
Correct Answer
B. UDP Attack
Explanation
UDP Attack refers to a type of attack where the attacker sends a large number of User Datagram Protocol (UDP) packets to a target system in order to overwhelm its network resources. Unlike TCP/IP Hijacking, ICMP Attacks, and Smurf Attacks, UDP attacks do not require the synchronization process and are not connection-oriented. This means that the attacker can send UDP packets without establishing a connection or ensuring that the packets are received in the correct order. Consequently, UDP attacks can be used to flood a target system with a high volume of traffic, causing it to become unresponsive or crash.
42.
Which of the below options would you consider as a program that constantly observes data traveling over a network?
Correct Answer
B. Sniffer
Explanation
A sniffer is a program that constantly observes data traveling over a network. It captures and analyzes network traffic, allowing users to monitor and analyze the data packets being transmitted. By passively listening to network communication, a sniffer can detect and analyze network issues, troubleshoot problems, and even capture sensitive information such as passwords. Therefore, a sniffer is the most appropriate option for a program that constantly observes data traveling over a network.
43.
From the listing of attacks, choose the attack which exploits session initiation between a Transport Control Program (TCP) client and server within a network?
Correct Answer
B. SYN attack
Explanation
The SYN attack exploits the session initiation process between a TCP client and server within a network. In this attack, the attacker sends a large number of SYN requests to the server, but does not complete the handshake process by sending the final ACK packet. This causes the server to keep the connection half-open and consume resources. This can lead to a denial of service as the server becomes overwhelmed with half-open connections and is unable to handle legitimate requests.
44.
Which statement correctly describes the difference between a secure cipher and a secure hash?
Correct Answer
C. A cipHer can be reversed, a hash cannot.
Explanation
A secure cipher refers to an encryption algorithm that can be reversed or decrypted, meaning that the original plaintext can be recovered from the ciphertext using the appropriate key. On the other hand, a secure hash function is a one-way mathematical function that transforms input data into a fixed-size output called a hash value or digest. It is computationally infeasible to reverse the process and obtain the original input from the hash value. Therefore, the correct answer is that a cipher can be reversed, while a hash cannot.
45.
A peer-to-peer computer network uses diverse connectivity between participants in a network and the cumulative bandwidth of network participants rather than conventional centralized resources where a relatively low number of servers provide the core value to a service or application. Which of the following is a security risk while using peer-to-peer software?
Correct Answer
C. Data leakage
Explanation
Data leakage is a security risk while using peer-to-peer software because it involves the unauthorized or unintentional transfer of sensitive or confidential data from one participant to another. Peer-to-peer networks allow direct communication and file sharing between participants, which increases the risk of data being accessed or intercepted by unauthorized users. This can result in the loss of valuable information, privacy breaches, and potential legal and financial consequences.
46.
From the listing of attacks; which analyzes how the operating system (OS) responds to specific network traffic, in an attempt to determine the operating system running in your networking environment?
Correct Answer
C. Fingerprinting
Explanation
Fingerprinting is the correct answer because it refers to the process of analyzing how the operating system responds to specific network traffic in order to determine the operating system running in the networking environment. This technique involves sending specific packets to a target system and analyzing the responses to identify the operating system. It is commonly used by attackers to gather information about a target system and exploit any vulnerabilities specific to that operating system.
47.
From the listing of attacks, choose the attack which misuses the TCP (Transmission Control Protocol) three-way handshake process, in an attempt to overload network servers, so that authorized users are denied access to network resources?
Correct Answer
D. SYN (Synchronize) attack
Explanation
The SYN (Synchronize) attack is the correct answer because it specifically targets the TCP three-way handshake process. In this attack, the attacker sends a large number of SYN requests to the server, but does not complete the handshake process by sending the final ACK packet. This causes the server to allocate resources for each incomplete connection attempt, eventually overwhelming the server and denying access to legitimate users.
48.
A technician is helping an organization to correct problems with staff members unknowingly downloading malicious code from Internet websites. Which of the following should the technician do to resolve the problem?
Correct Answer
B. Disable unauthorized ActiveX controls
Explanation
To resolve the problem of staff members unknowingly downloading malicious code from Internet websites, the technician should disable unauthorized ActiveX controls. ActiveX controls are a type of browser plugin that can execute code on a user's computer. By disabling unauthorized ActiveX controls, the technician can prevent staff members from inadvertently downloading and executing malicious code through these controls, thus reducing the risk of malware infections. This action helps to enforce security measures and protect the organization's systems and data from potential threats.
49.
A protocol analyzer will most likely detect which security related anomalies?
Correct Answer
A. Many malformed or fragmented packets
Explanation
A protocol analyzer is a tool used to capture and analyze network traffic. It can detect many malformed or fragmented packets, which are packets that do not adhere to the expected structure or are divided into smaller fragments for transmission. These anomalies can indicate potential security issues or attacks on the network. Passive sniffing of local network traffic, decryption of encrypted network traffic, and a disabled network interface on a server are not directly related to the function of a protocol analyzer in detecting security-related anomalies.
50.
One type of network attack sends two different messages that use the same hash function to generate the same message digest. Which network attack does this?
Correct Answer
C. Birthday attack.
Explanation
A birthday attack is a type of network attack where two different messages are sent using the same hash function, resulting in the same message digest. This attack takes advantage of the birthday paradox, which states that in a group of only 23 people, there is a 50% chance that two people will have the same birthday. Similarly, in a hash function, as the number of messages increases, the probability of two messages having the same digest also increases. Therefore, the correct answer is a birthday attack.