1.List any TWO requirements that MiniSec is designed to meet. 2.Which type of method is used to collect information during the passive reconnaissance? Reviewing public repositories API requests and responses Network Traffic Sniffing Social Engineering 3.Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? Shoulder surfing Man-in-the-middle attack Phishing Tailgating

icon
Related questions
Question
1.List any TWO requirements that MiniSec is designed to meet. 2.Which type of method is used to collect information during the passive reconnaissance? Reviewing public repositories API requests and responses Network Traffic Sniffing Social Engineering 3.Which attack method is MOST likely to be used by a malicious employee or insider trying to obtain another user's passwords? Shoulder surfing Man-in-the-middle attack Phishing Tailgating
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, cybersecurity and related others by exploring similar questions and additional content below.