Q. Even with two-factor authentication, users may still be vulnerable to_____________attacks. (Solved)
1. Scripting
2. Cross attack
3. Man-in-the-middle
4. Radiant
- c. Man-in-the-middle
1. Scripting
2. Cross attack
3. Man-in-the-middle
4. Radiant