Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Even with two-factor authentication, users may still be vulnerable to_____________attacks.

a) Radiant
b) Cross attack
c) scripting
d) Man-in-the-middle

Answer: d
Explanation: In such attacks, a user attempting to connect to the application is diverted to a fake Web site, which accepts the password from the user, and uses it immediately to authenticate to the original application.

Join The Discussion