Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 88 Topic 9 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 88 Topic 9 Discussion

312-49v11 Exam Topic 9 Question 88 Discussion:
Question #: 88
Topic #: 9

In the aftermath of a sophisticated cyber-attack on a financial institution, forensic investigators are tasked with retrieving critical evidence from a compromised server. However, upon examination, they encounter encrypted files and password-protected directories, indicating attempts to thwart forensic analysis through password protection.

To counter these anti-forensic measures effectively, which of the following strategies would be most effective?


A.

Conducting a brute-force attack to systematically guess the passwords of encrypted files and protected directories.


B.

Utilizing a dictionary attack to systematically test common passwords against encrypted files and directories.


C.

Deploying a targeted phishing campaign to obtain passwords or encryption keys safeguarding files and directories.


D.

Utilizing rainbow tables to expedite the decryption process and bypass password protection mechanisms.


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.