List of questions
Related questions
Question 172 - CIPT discussion
Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?
A.
Phishing emails.
B.
Denial of service.
C.
Brute-force attacks.
D.
Social engineering.
Your answer:
0 comments
Sorted by
Leave a comment first