MCQOPTIONS
Saved Bookmarks
| 1. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
| A. | Radiant |
| B. | Cross attack |
| C. | scripting |
| D. | Man-in-the-middle |
| Answer» E. | |