Which of the following can be used to defeat a call-back security system?

A.
Call waiting
B.
Passive wiretapping
C.
Active wiretapping
D.
Brute force password attacks
E.
Call forwarding
Explanation:
Call forwarding can be used to bypass the call back feature and is considered a security risk.