Certified Ethical Hacker (CEH) Practice Question

During a secure code audit you discover that a custom cipher's source code will remain proprietary, and the developer claims this secrecy makes brute-forcing the key impractical. As an ethical hacker, which fundamental cryptography concept should you reference to explain why depending on a hidden algorithm does not provide real security?

  • Key stretching

  • Principle of least privilege

  • Kerckhoffs's Principle

  • Perfect forward secrecy

Certified Ethical Hacker (CEH)
Cryptography
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot