Inference attacks involve ___________________________.
A.
Gathering pieces of secret information to predict or guess an outcome
B.
Deciphering encrypted communications
C.
Spoofing a connection to intercept plain text transmissions
D.
Collecting unclassified pieces of information to predict or guess an outcome