________ is a volume encryption tool developed by Apple for use with Macintosh computers. If it is enabled, virtually no helpful evidence can be retrieved

Fill in the blank(s) with the appropriate word(s).


Answer: FileVault. It is important to understand that when FileVault is set up, users are provided with a recovery key or a safety net in case the users lose their password and cannot decrypt the hard drive. The recovery key is long and difficult for users to remember but can decrypt the hard drive. A brute-force attack or a brute force with a dictionary attack is a potential option but could take an inordinate amount of time.

Computer Science & Information Technology

You might also like to view...

A digital song is broken into small pieces known as ____________.

a. tones b. samples c. pulses d. waves

Computer Science & Information Technology

In what circumstances should the application designer use direct files rather than indexed sequential files?

What will be an ideal response?

Computer Science & Information Technology

CDs that can be used more than one time are called ________ disks

Fill in the blank(s) with correct word

Computer Science & Information Technology

Early 3-D games used fixed 2-D images called _______________ to create the 3-D world.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology