List of questions
Related questions
Question 627 - CISSP discussion
Which of the following attacks is dependent upon the compromise of a secondary target in order to reach the primary target?
A.
Watering hole
B.
Brute force
C.
Spear phishing
D.
Address Resolution Protocol (ARP) poisoning
Your answer:
0 comments
Sorted by
Leave a comment first