Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?
A.
Trojan horse
B.
Land attack
C.
War dialer
D.
Denial-of-Service (DoS) attack
Explanation:
Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?
Which of the following attacks is used by attackers to access a company’s internal network
through its remote access system?
A.
Trojan horse
B.
Land attack
C.
War dialer
D.
Denial-of-Service (DoS) attack
Explanation: