FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

TYPES OF NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Brute-force attack
A
Every possible key is tried to find the secret code
B
the way to decode the ciphertext (coded message)-typically by finding out the secret key
C
same key used for encryption (coding the secret message) and decryption (decoding the secret message)
D
the formula that’s used to change the message back to normal
Explanation: 

Detailed explanation-1: -What’s a Brute Force Attack? A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.

Detailed explanation-2: -In brute force attack, on average half of all possible keys must be tried to achieve success. Explanation: In brute force attack the attacker tries every possible key on a piece of cipher-text until an intelligible translation into plaintext is obtained.

Detailed explanation-3: -A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your web site requires user authentication, you are a good target for a brute-force attack.

Detailed explanation-4: -A brute force attack against an encryption system attempts to decrypt encrypted data by exhaustively enumerating and trying encryption keys. Such an attack might be used when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier.

Detailed explanation-5: -Explanation: A brute force is the simplest process of gaining access to any password-protected system. It tries a variety of combinations of usernames & passwords again and again until it cracks it or password matches.

There is 1 question to complete.