Answer:
A dictonary attack.
Explanation:
Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.
Answer: (C) Response controls
Explanation:
According to the given question, the response control is not the necessary element while handling the users or customer data as compared to all the other given options that is individual participation, data minimization and the purpose specification.
- The response control is basically used for exchange the data or any information in an organization but the main disadvantage is that they share all the response and information as they not wait for the request from the users.
- The all the three other given options expect response control are the important element for handling the customer data as it helps in maintaining the Personal information.
Therefore, Option (C) is correct answer.
Answer:
Check the explanation
Explanation:
(a) There will be a need for the database to support a comparatively complex and complicated hierarchical internal record structure that may vary for each record. Column store NoSQL DBMS
(b)The key requirements for the database are to access a specific record structure as quickly as possible without any concern regarding the internal structure of the record. Key value store NoSQL DBMS
(c) The data are specifically well suited to be organized as a network of connections amid the data items. Graph Base NoSQL DBMS
(d) It is essential that the DBMS offers quick access to each of the records by a key value, but, in addition, it has to also allow easy access to the components of each record. Document store NoSQL DBMS
Answer:
I would say D hope this helps