

MCQOPTIONS
Saved Bookmarks
1. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
A. | Radiant |
B. | Cross attack |
C. | scripting |
D. | Man-in-the-middle |
Answer» E. | |