Posted by: Pdfprep
Post Date: July 1, 2021
Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?
A . A spear-phishing email with a file attachment.
B . A DoS using IoT devices
C . An evil twin wireless access point
D . A domain hijacking of a bank website
Answer: A
Leave a Reply