Q.

Even with two-factor authentication, users may still be vulnerable to_____________attacks.

A. Scripting
B. Cross attack
C. Man-in-the-middle
D. Radiant
Answer» C. Man-in-the-middle
857
0
Do you find this helpful?
2

View all MCQs in

Cloud Computing

Discussion

No comments yet