If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible.

A. known-plaintext B. chosen-plaintext

C. chosen ciphertext D. chosen text

B. chosen-plaintext

Computer Science & Information Technology

You might also like to view...

You can add a Feed Headlines gadget to your Windows Sidebar

Indicate whether the statement is true or false

Computer Science & Information Technology

The technique for adding highlights and shadows to a 3D image is called ____.

A. rendering B. ray tracing C. gradation D. rasterization

Computer Science & Information Technology