What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

A. chosen-ciphertext
B. chosen-plaintext
C. known plaintext
D. ciphertext-only


Answer: B

Computer Science & Information Technology

You might also like to view...

To exit out of a loop completely, and resume the flow of control at the next statement after the loop, use a _______.

a. continue statement. b. break statement. c. return statement. d. Any of the above.

Computer Science & Information Technology

You cannot insert text from a word processing program into Dreamweaver.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ function calculates the average, or arithmetic mean, of all cells in a range that meet a specific condition

Fill in the blank(s) with correct word

Computer Science & Information Technology

For what class of user is it MOST important to disable automatic listening of remote administration solutions?

A. power users B. mobile users C. administrative users D. security personnel

Computer Science & Information Technology