The correct answer is: B. On-path
Explanation:
An on-path attack (formerly known as a man-in-the-middle attack) exploits vulnerabilities in communication channels, including those arising from the use of weak cryptographic algorithms. If an attacker can intercept and manipulate communications between two parties (such as via an on-path attack), they can exploit weak encryption or outdated cryptographic protocols to decrypt or alter the data in transit. Insecure algorithms or improper implementations of cryptographic protocols may allow attackers to bypass encryption protections and gain unauthorized access to sensitive data.
For example, if weak encryption algorithms like DES or outdated SSL/TLS versions (e.g., SSL 3.0) are used, an attacker could break the encryption and intercept, modify, or inject malicious data into communications.
Password cracking exploits weak cryptographic algorithms to guess or brute-force passwords. Weak algorithms, like older versions of MD5 or SHA-1, can be easily cracked using modern computing power. This allows attackers to gain unauthorized access to systems and data.
Password cracking exploits weak cryptographic algorithms, particularly those used for hashing passwords. If the hashing algorithm is outdated or weak (e.g., MD5, SHA-1), it becomes much easier for attackers to:
Perform brute force attacks.
Use rainbow tables (precomputed hashes for cracking passwords).
Exploit hash collisions (where different inputs produce the same hash value).
B. On-path
Explanation:
An on-path attack (previously called a "man-in-the-middle attack") exploits weaknesses in the communication channel, often by intercepting, modifying, or injecting malicious data into the communication between two parties. If weak cryptographic algorithms (e.g., outdated encryption protocols or weak ciphers) are used in the communication, an attacker can exploit these weaknesses to decrypt or alter the communication, leading to successful on-path attacks. This type of attack is more effective when encryption is not strong enough to protect against interception.
GPT
upvoted 4 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Eracle
2 days, 3 hours agofavouredgirl
2 days, 16 hours agoProudFather
3 weeks, 5 days agoAndyK2
1 month agoNilab
1 month, 1 week agofmeox567
1 month, 2 weeks ago