At attacker would like to secretly compromise the Windows laptop of CEO’s assistant during the assistant’s lunch break. The attacker feels confident that he can secretly access the laptop physically but it will be password protected. Why could the attacker still be successful?
a. There are tools that can even break into password protected computers, as long as there’s a browser open in the background
b. The password can be quickly brute-forced
c. Windows laptops have built-in secure physical access funtionality
d. All of the above