The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A. one-way function
B. time complexity
C. chosen ciphertext
D. man-in-the-middle


D. man-in-the-middle

Computer Science & Information Technology

You might also like to view...

What is the definition of a relational database schema?

a. Primary/foreign key relationship between tables b. Complete set of table designs c. Unique identifier for a table d. Number of columns per table

Computer Science & Information Technology

Define the term protocol relative to networking.

What will be an ideal response?

Computer Science & Information Technology

?Data values can be _____.

A. ?numeric B. ?textual C. ?symbolic D. ?all of the above

Computer Science & Information Technology

A technician is trying to backup 5GB of data to an external hard drive formatted in FAT32. The backup keeps failing. Which of the following would BEST resolve this problem?

A. Replace the drive. B. Backup to a USB drive. C. Backup to a Blu-Ray disk. D. Reformat the drive as NTFS.

Computer Science & Information Technology