In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
A . Chosen-plaintext attack
B . Ciphertext-only attack
C . Adaptive chosen-plaintext attack
D . Known-plaintext attack
Answer: A
Latest CPEH-001 Dumps Valid Version with 736 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund