Q.

Even with two-factor authentication, users may still be vulnerable to attacks.

A. scripting
B. cross attack
C. man-in-the-middle
D. radiant
Answer» C. man-in-the-middle
1.2k
0
Do you find this helpful?
12

View all MCQs in

Cloud Computing

Discussion

No comments yet