Examveda
Examveda

Even with two-factor authentication, users may still be vulnerable to . . . . . . . . attacks.

A. Scripting

B. Cross attack

C. Man-in-the-middle

D. Radiant

Answer: Option C


This Question Belongs to Computer Science >> Cloud Computing

Join The Discussion

Related Questions on Cloud Computing