![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-black.png)
![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-white.png)
McqMate
Q. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks. |
A. | Scripting |
B. | Cross attack |
C. | Man-in-the-middle |
D. | Radiant |
Answer» C. Man-in-the-middle |
View all MCQs in
Cloud ComputingNo comments yet