Cadence will attempt to find two different sets of input text that will yield the same hash when using MD5. What type of attack is Cadence most likely to perform?
Pasua encrypts a message using a public key and the recipien…
Pasua encrypts a message using a public key and the recipient decrypts the message using the corresponding private key. What conclusions can you draw based on these actions?
An attacker is scanning wireless networks and discovers that…
An attacker is scanning wireless networks and discovers that one of them is set up to support the two most recent protocols. What type of attack is the malicious actor most likely to launch to try to breach the security settings of the wireless device?
Lamarr receives a text message indicating the password to hi…
Lamarr receives a text message indicating the password to his bank account has been changed but needs verification to commit the change. It includes a number to call and a link, both of which will lead to fraud if Lamarr follows through with the instructions. This is an example of what type of attack?
Duante needs to research the behavior of attackers as well a…
Duante needs to research the behavior of attackers as well as how they coordinate their attacks. Where is Duante most likely to look for this type of information?
You are tasked with installing a system in a large warehouse…
You are tasked with installing a system in a large warehouse that is capable of detecting levels of daylight to dim interior lights to conserve energy. In addition, if an intruder enters the warehouse an alarm should be triggered. The system you install will most likely support what type of signal/radio wave?
A threat actor does research, including Google searches, and…
A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?
Company A wants to be first to market with a product forecas…
Company A wants to be first to market with a product forecasted to be very profitable. A few bad actors in Company A launch an attack against Company B to steal intellectual property that will help them. What type of threat actor would do something like this?
A broker launches a variety of attacks to find a weakness th…
A broker launches a variety of attacks to find a weakness that will lead to financial gain. What activity is the broker most likely to engage in?
Evin thinks one of the computer systems where he works may h…
Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?