Answer:
B.
Explanation:
Threat Modeling is the process of identifying and optimizing network security. This practice helps to find the possible threats to confidential information.
<u>Threat Modeling is used to protect the systems. In this practice, the consultant identifies the enterprise's assets and analyze the work of all applications. Then it sets the security profile on all applications and documenting adverse effects of it</u>.
In the given scenario, the consultant will use the tool or technique of threat modeling to identify the potential attackers.
So, the correct answer is option B.
Answer:tortious interference
Explanation:
tortious interference is a law term that comes to mind when there is a breach of contract resulting from the competitor's actions. Tortious interference in Tort law(an area of law) deals with the situation in which there is damage to property emanating from intentional or negligent acts of the defendant, in this case the competitor in business. In which case the actions(competitive behaviour) of defendant is not justifiable and permissible and simultaneously breaches contract of plaintiff, it becomes tortious interference.
I can't tell but I'm thinking it's either A B or E I hope