ECCouncil Certified Ethical Hacker Exam 312-50 Question # 33 Topic 4 Discussion

ECCouncil Certified Ethical Hacker Exam 312-50 Question # 33 Topic 4 Discussion

312-50 Exam Topic 4 Question 33 Discussion:
Question #: 33
Topic #: 4

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?


A.

Birthday attack


B.

Plaintext attack


C.

Meet in the middle attack


D.

Chosen ciphertext attack


Get Premium 312-50 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.