Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 140 Topic 15 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 140 Topic 15 Discussion

312-50v13 Exam Topic 15 Question 140 Discussion:
Question #: 140
Topic #: 15

During a cryptographic audit of a legacy system, a security analyst observes that an outdated block cipher is leaking key-related information when analyzing large sets of plaintext–ciphertext pairs. What approach might an attacker exploit here?


A.

Launch a key replay through IV duplication


B.

Use linear approximations to infer secret bits


C.

Modify the padding to obtain plaintext


D.

Attack the hash algorithm for collisions


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.