Which of the following attacks requires the hacker to have the plaintext and the ciphertext of one or more messages?

a. Known plaintext attack
b. Ciphertext-only attack
c. Chosen plaintext attack
d. Chosen ciphertext attack


ANS: A

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a note or comment that displays at the bottom of the page on which the reference occurs

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ stores information about every object within a forest.

A. global catalog B. global master C. schema master D. master catalog

Computer Science & Information Technology

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

A. 20 B. 21 C. 22 D. 23

Computer Science & Information Technology

Activities transition between their states in response to various .

a. actions b. steps c. events d. deeds

Computer Science & Information Technology