Discuss some of the ways to recover passwords. Why do you think they are important to forensic investigation?

What will be an ideal response?

The answer should include the following points:
• Default passwords
• Social engineering/brute force
• Key disks

Computer Science & Information Technology

You might also like to view...

File sharing is free or paid access to file storage locations on the Internet.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Inheritance indicates a/an ____________ relationship.

(a) Is-a (b) Has-a (c) both A & B (d) none of the above

Computer Science & Information Technology