Which of the following can the administrator use to point out the phone system vulnerability?

A company wants an administrator to perform a vulnerability test. The administrator finds the
company has a POTS phone system. Which of the following can the administrator use to point out
the phone system vulnerability?

A company wants an administrator to perform a vulnerability test. The administrator finds the
company has a POTS phone system. Which of the following can the administrator use to point out
the phone system vulnerability?

A.
Honeypot

B.
Butt set

C.
Spyware

D.
Blue jacking



Leave a Reply 0

Your email address will not be published. Required fields are marked *