A __________ type of attack exploits properties of the RSA algorithm.

A. timing B. brute-force

C. chosen ciphertext D. mathematical


C. chosen ciphertext

Computer Science & Information Technology

You might also like to view...

Your organization produces a proprietary piece of hardware of which confidentiality of the software code is critical. Considering this what type of vulnerability testing should a third-party vulnerability team be allowed to perform?

A. white box B. black box C. regression D. integration

Computer Science & Information Technology

You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN.   Which of the following features will you configure on the SOHO router to accomplish this task?

A. Port forwarding B. MAC filtering C. Demilitarized zone D. Quality of service

Computer Science & Information Technology

Joe, a user, wants to send an encrypted email to Ann. Which of the following will Ann need to use to verify the validity's of Joe's certificate?

A. The CA's public key B. Joe's private key C. Ann's public key D. The CA's private key E. Joe's public key F. Ann's private key

Computer Science & Information Technology

Which of the following cables connects the parallel port of the computer to the printer?

a. IEEE 1394 b. IEEE 802.11 c. IEEE 802.3 d. IEEE 1284

Computer Science & Information Technology