Which of the following is an attack technique where the only information available to the attacker is some plaintext blocks along with the corresponding ciphertext and algorithm used to encrypt and decrypt the text?
A. Ciphertext-only attack
B. Adaptive chosen-plaintext attack
C. Chosen-plaintext attack
D. Known-plaintext attack
Answer: D. Known-plaintext attack
You might also like to view...
You can use the ____ statement to handle exceptions that occur while an application is running.
A. Error…Catch B. Try…Catch C. Error…Block D. Try…Block
_____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
A. Computer-aided design B. Software-aided design C. Application-aided design D. Program-aided design
Computer owners frequently upgrade their computer's processor.
Answer the following statement true (T) or false (F)
The process of calculating which action will lead to the greatest happiness is sometimes called the ____.
A. utilitarian calculus B. consequentialist matrix C. behavioral trigonometry D. differential calculus