ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 216 Topic 22 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 216 Topic 22 Discussion

EC0-350 Exam Topic 22 Question 216 Discussion:
Question #: 216
Topic #: 22

Which of the following cryptography attack methods is usually performed without the use of a computer?


A.

Ciphertext-only attack


B.

Chosen key attack


C.

Rubber hose attack


D.

Rainbow table attack


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.