The correct option is (b) Rule-based attack
For explanation I would say: Attackers can use the rule-based attack when he/she gets some information or hint regarding password he/she wants to crack. Examples of such scenarios are like: hacker knows about the type of password, or size or what type of data it might contain.