Which two statements best describe the impact of cryptography on security investigations?
A) All the employee's SSL/TLS outbound traffic should be decrypted and inspected since it requires minimal resources on the security appliance.
B) Cryptographic attacks can be used to find a weakness in the cryptographic algorithms.
C) With the increased legitimate usage of HTTPS traffic, attackers have taken advantage of this blind spot to launch attacks over HTTPS more than ever before.
D) Encryption does not pose a threat to the ability of law enforcement authorities to gain access to information for investigating and prosecuting cybercriminal activities.
E) Command and Control traffic is usually sent unencrypted. Therefore, it does affect the security investigations.