PdfPrep.com

Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?

Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?
A . A spear-phishing email with a file attachment.
B . A DoS using IoT devices
C . An evil twin wireless access point
D . A domain hijacking of a bank website

Answer: A

Exit mobile version