Question: Which of the following can be used to defeat a call-back security system?
A. Call waiting
B. Passive wiretapping
C. Active wiretapping
D. Brute force password attacks E. Call forwarding

Download pdf (with explanations) edition of this exam.