Q. Even with two-factor authentication, users may still be vulnerable to . . . . . . . . attacks.
β
Correct Answer: (C)
Man-in-the-middle
You must be Logged in to update hint/solution