Login or Create an Account to view the mark scheme, comment, and add to a test
Lenny connects to the internet via a public unsecured wireless network to shop online. He creates a new account at a store and makes a purchase with a new credit card that has never been used. Later that day, he discovers unauthorised transactions on his credit card. What has happened to Lenny may be an example of
(a).
a data breach.
(b).
social engineering.
(c).
cross-site scripting.
(d).
a man-in-the-middle attack.

Multiple Choice1 MarkPremium
2 Uses20 Views0 Likes