Go back to 312-50 - Ethical Hacking and Countermeasures (CEHv6)

Question :-

Which of the following cryptography attack methods is usually performed without the use of a computer?
Ciphertext-only attack
Chosen key attack
Rubber hose attack
Rainbow table attack

Want to practice for 312-50 - Ethical Hacking and Countermeasures (CEHv6) ? Click here.