What is the only viable method a determined attacker can attempt to compromise an encrypted file, assuming a publicly available cryptography standard was used?
A. Analyze the hash value
B. Reverse the encryption formula
C. Brute force guess the key
D. Examine the algorithms
Answer: C. Brute force guess the key
Computer Science & Information Technology
You might also like to view...
Microsoft Windows uses the ________ metaphor to describe the screen
A) lock B) Start C) desktop D) charms
Computer Science & Information Technology
The Notification area is a convenient place to display toolbars to shortcuts to Web resources
Indicate whether the statement is true or false
Computer Science & Information Technology