A threat actor has gained access to encryption keys that will permit them to read confidential information. What type of attack is this?
- eavesdropping
- man-in-the-middle
- password-based
- compromised key
Explanation: When encryption keys are stolen and use to decrypt private communications, a compromised-key attack has occurred.
Exam with this question: 2.2.4 Check Your Understanding - Classify Cyber Attacks
Exam with this question: 13.2.4 Check Your Understanding - Classify Cyber Attacks
Please login or Register to submit your answer