ISC Exam Questions

Which of the following is the MOST effective attack against cryptographic hardware modules?

Which of the following is the MOST effective attack against cryptographic hardware modules?

A.
Plaintext

B.
Brute force

C.
Power analysis

D.
Man-in-the-middle (MITM)