Prepare for the Ethical Hacking Essentials Test. Study with flashcards and multiple-choice questions, each exam includes hints and explanations. Get ready to ace your certification exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which of the following techniques is used by attackers to perform cryptanalysis?

  1. Social Engineering

  2. Brute-force attack

  3. Phishing attack

  4. Network scanning

The correct answer is: Brute-force attack

The technique used by attackers to perform cryptanalysis is a brute-force attack. This method involves systematically attempting every possible key or password combination until the correct one is found. In the context of cryptanalysis, brute-force attacks leverage the computational power available to decrypt encrypted data, assuming the key length is either known or can be estimated. Such attacks exploit the mathematical strength of Cryptographic algorithms by exhausting possible keys in an exhaustive manner. This approach is particularly relevant when dealing with encryption systems where the key space is not sufficiently large to deter the brute-force method, making it a viable tactic for attackers looking to compromise cryptographic security. Other methods mentioned, such as social engineering, phishing, and network scanning, focus on manipulating individuals, stealing credentials, or discovering vulnerabilities rather than directly attacking the cryptographic elements through brute-force means.