Which of the following can be used to defeat a call-back security system?

Which of the following can be used to defeat a call-back security system?

Which of the following can be used to defeat a call-back security system?

A.
Call waiting

B.
Passive wiretapping

C.
Active wiretapping

D.
Brute force password attacks
E. Call forwarding

Explanation:
Call forwarding can be used to bypass the call back feature and is considered a
security risk.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

15 − eleven =