

MCQOPTIONS
Saved Bookmarks
1. |
Even with two-factor authentication, users may still be vulnerableto attacks. |
A. | scripting |
B. | cross attack |
C. | man-in-the-middle |
D. | radiant |
Answer» D. radiant | |