InterviewSolution
Saved Bookmarks
| 1. |
Which of them is not a proper way of getting into the system?(a) IM(b) Attachments(c) Official product sites(d) Un-trusted sites, freeware and pirated softwareI had been asked this question in quiz.This key question is from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security |
|
Answer» The correct OPTION is (c) Official product sites |
|