header bg

Scan QR code or get instant email to install app

Question:

Which algorithm is Dan most likely to crack in the case that
He intercepted several encrypted files from an organization during a penetration test. They were encrypted with different algorithms?

A DES
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*