1.

In _______________ attacks an attacker do not contact with authorizing party for stealing password.

A. passive online
B. active online
C. offline
D. non-electronic
Answer» B. active online


Discussion

No Comment Found