Discuss some of the ways to recover passwords. Why do you think they are important to forensic investigation?
What will be an ideal response?
The answer should include the following points:
• Default passwords
• Social engineering/brute force
• Key disks
Computer Science & Information Technology
You might also like to view...
File sharing is free or paid access to file storage locations on the Internet.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Inheritance indicates a/an ____________ relationship.
(a) Is-a (b) Has-a (c) both A & B (d) none of the above
Computer Science & Information Technology