If an attacker intercepts encrypted network eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for if an attacker intercepts encrypted network traffic and successfully decrypts it, which cryptanalytic method can they employ to attempt

Full Certification Question

If an attacker intercepts encrypted network traffic and successfully decrypts it, which cryptanalytic method can they employ to attempt discovering the encryption key?