What is the only viable method a determined attacker can attempt to compromise an encrypted file, assuming a publicly available cryptography standard was used?

A. Analyze the hash value
B. Reverse the encryption formula
C. Brute force guess the key
D. Examine the algorithms

Answer: C. Brute force guess the key

Computer Science & Information Technology

You might also like to view...

Microsoft Windows uses the ________ metaphor to describe the screen

A) lock B) Start C) desktop D) charms

Computer Science & Information Technology

The Notification area is a convenient place to display toolbars to shortcuts to Web resources

Indicate whether the statement is true or false

Computer Science & Information Technology