An attacker is trying to discover the contents of encrypted messages that he can easily intercept. The attacker attempts to break messages by intercepting and substituting his own messages in a communications stream between two parties. This type of attack is known as:

a. Unknown plaintext
b. Known ciphertext
c. Man in the middle
d. Replay


c. Man in the middle

Computer Science & Information Technology

You might also like to view...

The ____ doctrine requires that "the state facilitate and not discriminate against speech by requiring public property be available for 'uninhibited, robust, and wide-open' discussion and debate on matters of public and societal importance."

A. fairness B. juris civiae C. public forum D. common carriage

Computer Science & Information Technology

PowerPoint provides several preset gradients, but you cannot create your own custom color mix.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a Trojan horse that pretends to be an anti-spyware program?

A) Flash Back B) Anti-Spyware 2011 C) Brain Test D) Net Bus

Computer Science & Information Technology

The results of an experiment would be an example of a tertiary source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology