Answer:
Rule based Attack.
Explanation:
As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.
This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.
Answer:
Insert tab
Explanation:
To use <em>Quick Parts</em>, first go to Insert tab then text group. The icon of <em>Quick Parts</em> is there in the attached picture.You can use the <em>Quick Part Gallery</em> to create, store, and reuse pieces of content, including <em>AutoText</em>, document properties (such as title and author), and fields. These reusable blocks of content are also called <u><em>building blocks</em></u>. <em>AutoText</em> is a common type of building block that stores text and graphics. You can use the <em>Building Blocks Organizer</em> to find or edit a building block
a cloud phone system is a Voice over IP (VoIP) based business telephoneplatform that is hosted by a third-party provider such as OnSIP. Cloud phonesystems typically offer advanced security and telephony features such as: extension dialing, auto attendants, and conference bridges
Please provide photos for your question.