Westonci.ca is your go-to source for answers, with a community ready to provide accurate and timely information. Get precise and detailed answers to your questions from a knowledgeable community of experts on our Q&A platform. Explore comprehensive solutions to your questions from knowledgeable professionals across various fields on our platform.

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?
A. Rule attack
B. Hybrid attack
C. Brute force attack
D. Dictionary attack