CompTIA Exam Questions

Which of the following would be MOST desirable when attacking encrypted data?

Which of the following would be MOST desirable when attacking encrypted data?

A.
Weak key

B.
Sniffed traffic

C.
Block cipher

D.
Algorithm used