Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-50 All Questions
Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

ECCouncil Certified Ethical Hacker 312-50 Question # 89 Topic 10 Discussion

312-50 Exam Topic 10 Question 89 Discussion:
Question #: 89
Topic #: 10

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?


A.

Birthday attack


B.

Plaintext attack


C.

Meet in the middle attack


D.

Chosen ciphertext attack


Get Premium 312-50 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.