πŸ“Š Cloud Computing
Q. Even with two-factor authentication, users may still be vulnerable to . . . . . . . . attacks.
  • (A) Scripting
  • (B) Cross attack
  • (C) Man-in-the-middle
  • (D) Radiant
πŸ’¬ Discuss
βœ… Correct Answer: (C) Man-in-the-middle

You must be Logged in to update hint/solution

πŸ’¬ Discussion


πŸ“Š Question Analytics

πŸ‘οΈ
95
Total Visits
πŸ“½οΈ
2 y ago
Published
πŸŽ–οΈ
Mr. Dubey
Publisher
πŸ“ˆ
97%
Success Rate