Welcome to Westonci.ca, where finding answers to your questions is made simple by our community of experts. Ask your questions and receive detailed answers from professionals with extensive experience in various fields. Explore comprehensive solutions to your questions from a wide range of professionals on our user-friendly platform.

Which two statements best describe the impact of cryptography on security investigations?
A) All the employee's SSL/TLS outbound traffic should be decrypted and inspected since it requires minimal resources on the security appliance.
B) Cryptographic attacks can be used to find a weakness in the cryptographic algorithms.
C) With the increased legitimate usage of HTTPS traffic, attackers have taken advantage of this blind spot to launch attacks over HTTPS more than ever before.
D) Encryption does not pose a threat to the ability of law enforcement authorities to gain access to information for investigating and prosecuting cybercriminal activities.
E) Command and Control traffic is usually sent unencrypted. Therefore, it does affect the security investigations.