Answer:
this is wot u get for not paying attiention on class
Explanation:
Answer:
a. social engineering attack
Explanation:
Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.
Answer: (C) Sensitivity analysis
Explanation:
The sensitivity analysis is also known as simulation analysis or "What-if" analysis as, it is basically used for the outcome prediction of the decision making in various range of the given variable.
It is used by making a given arrangement of factors, an investigator can decide that how changing in a single variable influence the final result.
The sensitivity analysis is the process for investigation of how the vulnerability in the yield of a scientific model or framework can be isolated in the system.
Theretofore, Option (C) is correct as all the other options does not involve in the study of variable and also others are not the extension of what-if analysis.
Answer:
a type of machine learning based on artificial neural networks in which multiple layers of processing are used to extract progressively higher level features from data.