1.List any TWO requirements that MiniSec is designed to meet. 2.Which type of method is used to collect information during the passive reconnaissance? Reviewing public repositories API requests and responses Network Traffic Sniffing Social Engineering 3.Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? Shoulder surfing Man-in-the-middle attack Phishing Tailgating
1.List any TWO requirements that MiniSec is designed to meet. 2.Which type of method is used to collect information during the passive reconnaissance? Reviewing public repositories API requests and responses Network Traffic Sniffing Social Engineering 3.Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? Shoulder surfing Man-in-the-middle attack Phishing Tailgating
Related questions
Question
1.List any TWO requirements that MiniSec is designed to meet.
2.Which type of method is used to collect information during the passive reconnaissance?
Reviewing public repositories
API requests and responses
Network Traffic Sniffing
Social Engineering
3.Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords?
Shoulder surfing
Man-in-the-middle attack
Phishing
Tailgating
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps