ISC Exam Questions

Which of the following can be used to defeat a call-back security system?

Which of the following can be used to defeat a call-back security system?

A.
Call waiting

B.
Passive wiretapping

C.
Active wiretapping

D.
Brute force password attacks

E.
Call forwarding

Explanation:
Call forwarding can be used to bypass the call back feature and is considered a security risk.