πŸ“Š Cloud Computing
Q. Even with two-factor authentication, users may still be vulnerable to attacks.
  • (A) scripting
  • (B) cross attack
  • (C) man-in-the-middle
  • (D) radiant
πŸ’¬ Discuss
βœ… Correct Answer: (C) man-in-the-middle

You must be Logged in to update hint/solution

πŸ’¬ Discussion

πŸ“Š Question Analytics

πŸ‘οΈ
756
Total Visits
πŸ“½οΈ
3 y ago
Published
πŸŽ–οΈ
Mr. Dubey
Publisher
πŸ“ˆ
88%
Success Rate