ECCouncil Related Exams
312-96 Exam
Which of the threat classification model is used to classify threats during threat modeling process?
Identify the type of attack depicted in the following figure.

The software developer has implemented encryption in the code as shown in the following screenshot.

However, using the DES algorithm for encryption is considered to be an insecure coding practice as DES is a weak encryption algorithm. Which of the following symmetric encryption algorithms will you suggest for strong encryption?