Register
15:00
Stop
CEH - Cryptography - Cryptography Concepts
Expert
1/15
During a security audit, a penetration tester discovers that an organization is using a symmetric key encryption algorithm that produces the same ciphertext each time a specific plaintext is encrypted with the same key. Which encryption mode is most likely being used?
a.
Output Feedback (OFB) mode with repeated keystream generation
b.
Galois/Counter Mode (GCM) with deterministic nonce values
c.
Cipher Block Chaining (CBC) mode with static initialization vectors
d.
Electronic Codebook (ECB) mode
Expert