Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?
A . A spear-phishing email with a file attachment
B . A DoS using loT devices
C . An evil twin wireless access point
D . A domain hijacking of a bank website

Answer: A

Leave a Reply

Your email address will not be published.