FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is a common method for password collection?
A
Email attachments
B
Back door intrusions
C
SQL Injection
D
Network sniffers
Explanation: 
There is 1 question to complete.