What can be used to compromise and defeat callback security?
A.
Passive wiretapping
B.
Call forwarding
C.
Packet spoofing
D.
Brute force attack
Explanation:
A remote access server can be configured to drop a remote users
connection and call him back at a predefined number. If call forwarding is enabled,
this security measure can be compromised.