Effective CISSP Questions

You are encrypting data using a well-known block cipher in CBC mode with a randomly generated symmetric key, yHj7rXtKd/Q4EdIIEDifQFrid2w=, to communicate with a peer host on an 802.3 Ethernet. A middle man captured the traffic and happened to decrypt the ciphertext using another key, zycATbEloWRKFo5C9MfgrjXeCTk=, during the cryptanalysis process. Which of the following best describes the phenomenon? (Wentz QOTD)
A. Collision detection
B. Server pharming
C. Key clustering
D. Hash collision

Continue reading

WUSON Practice Field POC Completed!

WUSON Practice Field, A Simple Test Engine for CISSP

A simple test engine is about to support my QOTDs:)Technologies used:

  • Cloud Services (API, Docker, SQL) on Azure
  • Web API and Auth0 (OIDC/OAuth2)
  • Microservices-based design
  • Microsoft .NET 5.0
  • Legacy Windows Forms App