1.

Which of the following case comes under victims’ list of an active online attack?#

A. Strong password based accounts
B. Unsecured HTTP users
C. Open authentication points
D. Logged in systems and services
Answer» D. Logged in systems and services


Discussion

No Comment Found