Discover the answers to your questions at Westonci.ca, where experts share their knowledge and insights with you. Our Q&A platform provides quick and trustworthy answers to your questions from experienced professionals in different areas of expertise. Get immediate and reliable solutions to your questions from a community of experienced professionals on our platform.

Which two statements best describe the impact of cryptography on security investigations?
A) All the employee's SSL/TLS outbound traffic should be decrypted and inspected since it requires minimal resources on the security appliance.
B) Cryptographic attacks can be used to find a weakness in the cryptographic algorithms.
C) With the increased legitimate usage of HTTPS traffic, attackers have taken advantage of this blind spot to launch attacks over HTTPS more than ever before.
D) Encryption does not pose a threat to the ability of law enforcement authorities to gain access to information for investigating and prosecuting cybercriminal activities.
E) Command and Control traffic is usually sent unencrypted. Therefore, it does affect the security investigations.