In a Man in the Middle (MitM) attack, the hacker captured the data being sent and is now trying to decrypt the data. He is applying Caesar cipher. Which key should he use to decrypt the data, "vgyycuxj oy ykiaxk" to "password is secure"?

3.0
4.0
5.0
6.0
Verified Answer
Correct Option - d

To get all Infosys Certified Cyber Security Associate Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram