What best describes a brute-force attack?
- breaking and entering into a physical building or network closet
- an attacker’s attempt to decode a cipher by attempting each possible key combination to find the correct one
- a rogue DHCP server that is posing as a legitimate DHCP server on a network segment
- an attacker inserting itself between two devices in a communication session and then taking over the session.
Explanation & Hint:
A brute-force attack is best described as:
In the context of cryptography, a brute-force attack involves systematically checking all possible keys until the correct key is found. This method can eventually crack any encryption algorithm, given enough time and computational resources, which is why it’s crucial to use sufficiently strong and complex keys that make such an attack infeasible. |