1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
5

During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.

Chose the best course of action they should take to access the data on that drive.
a. Use image filtering techniques to see what's behing the encrypted files.
b. Try to convince the owner of the computer to give you to decryption key/password.
c. Identify the encryption algorithm and attempt a brute force attack to get access to the file.
d. Disconnect the hard drive from power so the encryption key can be exposed on the next power up.
e. Try to copy the drive bit by bit so you can see the files in each directory.
Computers and Technology
1 answer:
borishaifa [10]3 years ago
4 0

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

You might be interested in
What are two differences between a wide angle lens and a telephoto lens?
adell [148]

Answer:

A wide-angle lens is all about wide focus it keeps the entire shot in focus regardless of distance. A telephoto lens is all about selective focus, or choosing which objects looks sharp or blurry. Wide-angle lenses generally have a longer depth of field, which means that they are not the right fit for a situation like portrait photography, where you only want the subject in sharp focus. In order to choose the right lens for your situation, you’ll need to decide how much in-focus detail you want in your shots.

Explanation:

6 0
3 years ago
Read 2 more answers
This is a tableware use to serve the main dish
GuDViN [60]

Answer:

<em>Dinner plate is a type of plate used for main courses. The average dinner plate measures 11 or 12 inches across. This plate is the most used plate during the entire meal and it usually comes out after the salad, it is the plate resting just above the charger.</em>

6 0
3 years ago
Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
wolverine [178]
I can solve it with Java. Here it is: 

areaOfSquare = stdin.nextDouble();
double sqrt = Math.sqrt(areaOfSquare);
if(Double.isNaN(sqrt)){
     System.out.print("INVALID");
} else {
     System.out.print(sqrt);
}
3 0
4 years ago
What is a protein called if it loses its shape?
hichkok12 [17]
When a protein is denatured, itloses its function. Examples: A denatured enzyme ceases to function. A denatured antibody no longer can bind its antigen.
7 0
3 years ago
An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte
Mama L [17]

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

8 0
3 years ago
Other questions:
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • What command would you use to list the text files in your
    7·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report visually, typically
    15·1 answer
  • For the questions below, consider a class called ChessPiece. This class has two instance data, String type and int player. The v
    13·1 answer
  • You are given an integer N, followed by N lines of input (1 &lt;= N &lt;= 100). Each line of input contains one or several words
    8·1 answer
  • Write a Java program that has a static method named range that takes an array of integers as a parameter and returns the range o
    10·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
  • I need help with my work
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!