Which of the following attacks is used by attackers to access a company’s internal network through its remote access system?

Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?

Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?

A.
Trojan horse

B.
Land attack

C.
War dialer

D.
Denial-of-Service (DoS) attack

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *