Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.

Although it is considered a low tech attack ____________ is still a very effective way of gaining
unauthorized access to network systems.

Although it is considered a low tech attack ____________ is still a very effective way of gaining
unauthorized access to network systems.

A.
Sniffing

B.
Eavesdropping

C.
Social Engineering

D.
Shoulder Surfing

E.
None of the items are correct



Leave a Reply 0

Your email address will not be published. Required fields are marked *