A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

A) brute-force
B) Caesar attack
C) ciphertext only
D) chosen plaintext


A) brute-force

Computer Science & Information Technology

You might also like to view...

Suppose a list contains {"red", "green", "red", "green"}. What is the list after the following code?

``` String element = "red"; for (int i = 0; i < list.size(); i++) if (list.get(i).equals(element)) { list.remove(element); i--; } ``` a. {"red", "red", "green"} b. {"red", "green"} c. {"green", "green"} d. {"green"} e. {}

Computer Science & Information Technology

A security is a legal document that can be bought and sold and holds some financial value

Indicate whether the statement is true or false

Computer Science & Information Technology

When you combine a field name with a table name, you say that you ____ the field names.

A. concatenate B. combine C. normalize D. qualify

Computer Science & Information Technology

In the figure above, the numbers 3 and 4 refer to the scope of report choices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology