Which of the following attacks requires the hacker to obtain several encrypted messages that have been encrypted with the same protocol?
a. Known plaintext attack
b. Ciphertext-only attack
c. Chosen plaintext attack
d. Chosen ciphertext attack
ANS: B
Computer Science & Information Technology
You might also like to view...
When designing a calculated field, complex formulas can be created with the:
A) Table Wizard. B) Expression Builder. C) Form Wizard. D) Report Builder.
Computer Science & Information Technology
The __________ project produces a free, multiplatform 4.4BSD-based UNIX-like operating system.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology