Which of the following are practical risks that apply to software-based volume encryption systems? Select all that apply.
a) Retrieve working key from saved RAM when the system hibernates
b) Intercept a passphrase that unlocks the encrypted drive
c) Trial-and-error guessing of a working key
d) Offline cracking of wrapped keys
e) Online eavesdropping on a software encryption process