In this task, you are given a context, a subject, a relation, and many options. Based on the context, from the options select the object entity that has the given relation with the subject. Answer with text (not indexes).
Q: Context: Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the IEEE 802.11 standards. "Wi-Fi" is a trademark of the Wi-Fi Alliance, which restricts the use of the term "Wi-Fi Certified" to products that successfully complete interoperability certification testing., Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are almost identical to the legitimate one. Communications purporting to be from social web sites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that are infected with malware., Computer security, also known as cybersecurity or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide., DEF CON (also written as DEFCON, Defcon, or DC) is one of the world's largest annual hacker conventions, held annually in Las Vegas, Nevada, with the first DEF CON taking place in June 1993. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked." The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as social events Wargames and contests in everything from creating the longest Wi-Fi connection and hacking computer systems to who can most effectively cool a beer in the Nevada heat., In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users., A lawyer is a person who practices law, as an advocate, barrister, attorney, counselor or solicitor or chartered legal executive. Working as a lawyer involves the practical application of abstract legal theories and knowledge to solve specific individualized problems, or to advance the interests of those who hire lawyers to perform legal services., Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. Different methods have been used to protect the transfer of data, including encryption and from-the-ground-up engineering., The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a "network of networks" that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks for file sharing., Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password., Nevada (Spanish for "snowy"; see pronunciations) is a state in the Western, Mountain West, and Southwestern regions of the United States of America. Nevada is the 7th most extensive, the 34th most populous, and the 9th least densely populated of the 50 United States. Nearly three-quarters of Nevada's people live in Clark County, which contains the Las VegasParadise metropolitan area where three of the state's four largest incorporated cities are located. Nevada's capital is Carson City. Nevada is officially known as the "Silver State" because of the importance of silver to its history and economy. It is also known as the "Battle Born State", because it achieved statehood during the Civil War (the words "Battle Born" also appear on the state flag); as the "Sage-brush State", for the native plant of the same name; and as the "Sage-hen State". Nevada borders Oregon to the northwest, Idaho to the northeast, California to the west, Arizona to the southeast and Utah to the east., Jeff Moss , also known as The Dark Tangent , ( born January 1 , 1975 ) is an American hacker , computer security expert and internet security expert who founded the Black Hat and DEF CON computer Hacker conferences ., Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore, telecommunication systems, such as equipment and systems connected to public telephone networks. The term "phreak" is a sensational spelling of the word "freak" with the "ph-" from "phone", and may also refer to the use of various audio frequencies to manipulate a phone system. "Phreak", "phreaker", or "phone phreak" are names used for and by individuals who participate in phreaking., A journalist is a person who collects, writes, or distributes news or other current information. A journalist's work is called journalism. A journalist can work with general issues or specialize in certain issues. However, most journalists tend to specialize, and by cooperating with other journalists, produce journals that span many topics. For example, a sports journalist covers news within the world of sports, but this journalist may be a part of a newspaper that covers many different topics., Subject: jeff moss , Relation: place_of_birth, Options: (A) alliance (B) banks (C) battle (D) california (E) clark (F) clark county (G) enter (H) idaho (I) legal (J) most (K) nevada (L) of (M) paradise (N) peer (O) utah
A:
california