1.

Which of the following case comes under victims’ list of an active online attack?

A. Strong password based accounts
B. Unsecured HTTP users
C. Open authentication points
D. Logged in systems and services
Answer» D. Logged in systems and services


Discussion

No Comment Found