Answer:
Rule based Attack.
Explanation:
As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.
This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.
The below displays ice-creams with its associated flavours. This we would display using <UL>
• Stick
o Chocobar
o Feast
• Bowl
o Butterscotch
o Blueberry
<UL>
<LI>Stick
<UL>
<LI>Chocobar </LI>
<LI> feast</LI>
</UL>
</LI>
<LI>Bowl
<UL>
<LI> Butterscotch </LI>
<LI> Blueberry </LI>
</UL>
</LI>
</UL>
Here <UL> tag is used to create un ordered list and one another <UL> tag inside <LI> created nested list which is the actual requirement. Like this we can created nested unordered lists and you can nest upto 4 levels and increasing the number of levels further may reduce clarity.
Answer:
B. Use the auto-summary command.
Explanation:
With the implementation of dynamic routing protocols, RIP summarizes networks at classful boundaries by default. To configure a router to automatically summarize networks, the auto-summary command would be used.
Answer: E-mails
Explanation:
An E-mails is one of the type of digital message and also known as the dominant communication tool which is used for in the form of document in an organization where we can used it in different ways are as follows:
- Communicating with other employees related to rules and regulations of an organization
- Making various types of recommendations
- Used for an inquiry purpose
- providing various types of current status and new updates
According to the given question, Emails is one of the type of tool that is used as the communication medium and it is one of the flexible message delivery options which is widely used by an organizations.