14:59
Stop
CEH - Cryptography - Encryption Algorithms
Expert
1/15
During a security audit, a penetration tester discovers that an organization is using a symmetric key encryption algorithm that produces the same ciphertext each time a specific plaintext is encrypted with the same key. Which encryption mode is most likely being used?
Expert