Which of the following has the correct definition mapping?
i.Brute force attacks Performed with tools that cycle through many possiblecharacter, number, and symbol combinations to uncover a password.
ii. Dictionary attacks Files of thousands of words are compared to the user’spassword until a match is found.
iii. Social engineering An attacker falsely convinces an individual that she has thenecessary authorization to access specific resources.
iv. Rainbow table An attacker uses a table that contains all possible passwordsalready in a hash format.
A.
i, ii, iv
B.
i, ii, iii
C.
i, ii, iv
D.
i, ii, iii, iv
Explanation:
The list has all the correct terms to definition mappings.