Додати до Chrome
✅ Перевірена відповідь на це питання доступна нижче. Наші рішення, перевірені спільнотою, допомагають краще зрозуміти матеріал.
Match the attack to its definition
An attacker systematically tries every possible combination of characters to discover a password or encryption key.
An attacker sends a fraudulent message, often disguised as a legitimate one, to trick a victim into revealing sensitive information like passwords or credit card numbers
An attacker intercepts a valid data transmission and fraudulently re-sends or delays it to trick the receiver into repeating an action.
An attacker can encrypt arbitrary plaintexts of their choosing and analyse the resulting ciphertexts to deduce the secret key
An attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
An attacker can submit chosen ciphertexts to a decryption system and analyse the resulting plaintexts (or error messages) to deduce the secret key.
An attacker exploits human psychology and trust to trick people into making security mistakes or giving up confidential information.
An attacker only listens to or monitors communications to gather information without altering the data.
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!