Answer:
The answer is D
Explanation:
file association associates a file with an application capable of opening that file. More commonly, a file association associates a class of files with a corresponding application.
Answer: 3) Information extortion
Explanation:
Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.
- Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
- Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
- Thus, the correct option is option(3).
My sister would what’s your id
Answer:
Rule based Attack.
Explanation:
As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.
This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.