Q: 12
Which of the following can be used to bypass even the best physical and logical security mechanisms
to gain access to a system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.