Answer :
The selected options are A,B,C,D. These are practical risks that can apply to software-based volume encryption systems:
Retrieve working key from saved RAM when the system hibernates: If the encryption key is stored in RAM, it can be lost when the system is hibernated or powered off. This can make it difficult or impossible to access the encrypted data without the key.
Intercept a passphrase that unlocks the encrypted drive: If the passphrase to unlock the encrypted drive is stored in plaintext or in an easily guessable format, an attacker may be able to intercept it and gain access to the encrypted data.
Trial-and-error guessing of a working key: If the encryption key is randomly generated, an attacker may be able to trial-and-error guess the key until they find the correct one. This can be made more difficult by using a longer key length and a more complex key generation algorithm.
Online cracking of wrapped keys: Some software-based encryption systems use "wrapped" keys, which are derived from a longer key using a one-way cryptographic function. An attacker may be able to crack the wrapped key and obtain access to the longer key.
Online eavesdropping on a software encryption process: If the encryption process is performed over an insecure network, an attacker may be able to eavesdrop on the encrypted data and obtain the plaintext. This can be mitigated by using a secure encryption protocol and encrypting the data both in transit and at rest.
Learn more about volume encryption Visit : brainly.com/question/29563128
#SPJ11