Which of the following attacks requires the hacker to obtain several encrypted messages that have been encrypted with the same protocol?

a. Known plaintext attack
b. Ciphertext-only attack
c. Chosen plaintext attack
d. Chosen ciphertext attack

ANS: B

Computer Science & Information Technology

You might also like to view...

When designing a calculated field, complex formulas can be created with the:

A) Table Wizard. B) Expression Builder. C) Form Wizard. D) Report Builder.

Computer Science & Information Technology

The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology