header bg

Question:

Which algorithm is Dan most likely to crack in the case that
He intercepted several encrypted files from an organization during a penetration test. They were encrypted with different algorithms?

A DES
Explaination