Which of the following security threats does NOT use software to extract sensitive information or credentials?

Which of the following security threats does NOT use software to extract sensitive
information or credentials?

Which of the following security threats does NOT use software to extract sensitive
information or credentials?

A.
Grayware

B.
Shoulder surfing

C.
Malware

D.
Man-in-the-Middle exploits

Explanation:

Reference:
http://searchsecurity.techtarget.com/definition/shoulder-surfing



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Sad Panda

Sad Panda

my balls are blue… it makes me a very sad panda 🙁