A. Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.
B. Extraction of cryptographic secrets through coercion or torture.
C. Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.
D. A backdoor placed into a cryptographic algorithm by its creator.
Scroll down for answer
The following books are highly recommended to progress your CEH v10 studies.
CEH v10 EC Council questions and answers.
FREE PDF Download of all CEH v10 exam questions and answers.