In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
A . Chosen-plaintext attack
B . Ciphertext-only attack
C . Adaptive chosen-plaintext attack
D . Known-plaintext attack
Answer: A