Welcome to Westonci.ca, the ultimate question and answer platform. Get expert answers to your questions quickly and accurately. Experience the ease of finding reliable answers to your questions from a vast community of knowledgeable experts. Our platform provides a seamless experience for finding reliable answers from a network of experienced professionals.

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password?
A. Rule attack
B. Hybrid attack
C. Brute force attack
D. Dictionary attack