GAQM Certified Professional Ethical Hacker (CPEH) CPEH-001 Question # 72 Topic 8 Discussion

GAQM Certified Professional Ethical Hacker (CPEH) CPEH-001 Question # 72 Topic 8 Discussion

CPEH-001 Exam Topic 8 Question 72 Discussion:
Question #: 72
Topic #: 8

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?


A.

Birthday attack


B.

Plaintext attack


C.

Meet in the middle attack


D.

Chosen ciphertext attack


Get Premium CPEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.