__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

A) Brute-force
B) Cryptanalytic
C) Block cipher
D) Transposition


B) Cryptanalytic

Computer Science & Information Technology

You might also like to view...

To access VideoTools, click the movie window, then select _________ tab.

A. either the FORMAT or PLAYBACK B. only the FORMAT C. only the PLAYBACK D. the VIEW

Computer Science & Information Technology

You can use contact information from People in other apps, including ____.

A. Weather B. News C. Sports D. Mail

Computer Science & Information Technology

Which of the following files have replaced NTLDR in the Windows Vista startup process?

A. bootmgr.exe, winload.exe, winresume.exe B. bootmgr.exe, bootsect.dos, io.sys C. ntdetect.exe, ntoskrnl.exe, io.sys D. io.sys, win.exe, bootmgr.exe

Computer Science & Information Technology

_____ transmits data between two electronic devices using radio frequency.

A. ?Bluetooth B. ?CATV C. ?ADSL D. ?ISDN

Computer Science & Information Technology