If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible.
A. known-plaintext B. chosen-plaintext
C. chosen ciphertext D. chosen text
B. chosen-plaintext
Computer Science & Information Technology
You might also like to view...
You can add a Feed Headlines gadget to your Windows Sidebar
Indicate whether the statement is true or false
Computer Science & Information Technology
The technique for adding highlights and shadows to a 3D image is called ____.
A. rendering B. ray tracing C. gradation D. rasterization
Computer Science & Information Technology