Cisco Exam Questions

What form of attack are all algorithms susceptible to?

What form of attack are all algorithms susceptible to?

A.
Meet-in-the-middle

B.
Spoofing

C.
Stream cipher

D.
Brute-force