InterviewSolution
Saved Bookmarks
| 1. |
Even with two-factor authentication, users may still be vulnerable to_____________attacks.(a) Radiant(b) Cross attack(c) scripting(d) Man-in-the-middleThis question was posed to me during an interview.I'd like to ask this question from Application Security topic in portion Database Programming Techniques of Database Management |
|
Answer» The correct answer is (d) Man-in-the-middle |
|