What characteristic describes identity theft?
- the use of stolen credentials to access private data
- software on a router that filters traffic based on IP addresses or applications
- software that identifies fast-spreading threats
- a tunneling protocol that provides remote users with secure access into the network of an organization
Exam with this question: CCNA 1 v7.0 Final Exam Answers
Exam with this question: 15.7.2 Check Your Understanding – Identify the Security Term