An attacker may obtain duplicate texts, one in ciphertext and one in plaintext, which enable the individual to reverse-engineer the encryption algorithm in a ____ attack.

A. man-in-the-middle
B. timing
C. known-plaintext
D. selected-plaintext


Answer: C

Computer Science & Information Technology

You might also like to view...

The default time-to-live (TTL) value is typically one ____.

A. minute B. hour C. day D. week

Computer Science & Information Technology

How do you apply a stroke or drop shadow?

What will be an ideal response?

Computer Science & Information Technology

A ____ error occurs when the computer is instructed to divide by 0.

A. Syntax B. Run-time C. Logic D. Semantic

Computer Science & Information Technology

A(n) data series is a sequence of related numbers that shows a trend. __________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology