Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
Meet in the middle attack
Chosen ciphertext attack
Birthday attack
Plaintext attack
I find the question unclear. If the attacker is "subsequently able to decrypt" the sniffed traffic, why would he/she still need to find the encryption key, as only the availability of the encryption key allows the "decription" of the sniffed traffic. The first sentence should be reformulated to something like: An attacker sniffs encrypted traffic from the network and is subsequently able to also obtain the original un-encrypted data.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.