Discuss some of the ways to recover passwords. Why do you think they are important to forensic investigation?

What will be an ideal response?


The answer should include the following points:
• Default passwords
• Social engineering/brute force
• Key disks

Computer Science & Information Technology

You might also like to view...

Many US Web sites have buttons similar to these:


What problems might these cause if the site is translated?

Computer Science & Information Technology

Which of the following is NOT a feature introduced with Windows Server 2008 or Windows Server 2008 R2?

A. Hyper-V B. Active Directory C. Server Core D. AppLocker

Computer Science & Information Technology

The __________ plan is a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Rich Internet Applications that are developed with Flash are known as Flash ____.

a. clips b. items c. movies d. videos

Computer Science & Information Technology