Which of the following attacks requires the hacker to have the plaintext and the ciphertext of one or more messages?
a. Known plaintext attack
b. Ciphertext-only attack
c. Chosen plaintext attack
d. Chosen ciphertext attack
ANS: A
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a note or comment that displays at the bottom of the page on which the reference occurs
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____ stores information about every object within a forest.
A. global catalog B. global master C. schema master D. master catalog
Computer Science & Information Technology
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20 B. 21 C. 22 D. 23
Computer Science & Information Technology
Activities transition between their states in response to various .
a. actions b. steps c. events d. deeds
Computer Science & Information Technology