15:00
Stop
CEH - Cryptography - Cryptography Concepts
Expert
1/15
During a security audit, a penetration tester discovers that an organization is using a symmetric key encryption algorithm that produces the same ciphertext each time a specific plaintext is encrypted with the same key. Which encryption mode is most likely being used?
Expert