ECCouncil Exam Questions

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The at

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

A. Birthday attack

B. Plaintext attack

C. Meet

in the middle attack

D. Chosen ciphertext attack