Which of the following can be used to defeat a call-back security system?

Which of the following can be used to defeat a call-back security system?

Which of the following can be used to defeat a call-back security system?

A.
Call waiting

B.
Passive wiretapping

C.
Active wiretapping

D.
Brute force password attacks

E.
Call forwarding

Explanation:
Call forwarding can be used to bypass the call back feature and is considered a security risk.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

10 − 5 =