Answer: 3) Information extortion
Explanation:
Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.
- Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
- Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
- Thus, the correct option is option(3).
Breach..
bugs and viruses
hack
Answer:
ring network
Explanation:
In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.
In comparison,
- in a star network every communication needs to pass through a central hub node
- in a bus, each node is connected to a shared linear communication bus.
- in a hierarchical network nodes are organized along a tree structure layout.
Its answer is c. hardness
no.13 answer is( B ) and no.14 answer is also (B)