"Release of message contents to any person or process not possessing the appropriate cryptographic key" is a __________ attack.

A. content modification
B. source repudiation
C. disclosure
D. sequence modification


C. disclosure

Computer Science & Information Technology

You might also like to view...

Which of the following statements are correct for recursion?

a. Recursion is available only in the C and C++ languages. b. Recursion is available in all programming languages. c. Recursion is available in most modern programming languages, including C++. d. Recursion is a preprocessor technique e. Recursion, if used with care can be a useful programming technique.

Computer Science & Information Technology

__________ increases performance by holding information in memory (as opposed to on disk) in case the information is needed a second time.

a. Caching b. Multitasking c. The virtual memory manager d. Buffering

Computer Science & Information Technology

Which of the following statements is false?

a. References to interface types do not have access to method toString. b. Method toString can be invoked implicitly on any object. c. With inheritance, classes and their inherited classes tend to be very similar. d. Dramatically different classes can often meaningfully implement the same interface.

Computer Science & Information Technology

The accompanying figure illustrates the _____ slide layout.

A. Title Slide B. Title and Content C. Title Only D. Comparison

Computer Science & Information Technology