124k views
3 votes
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers like Wireshark and capturing packets c. using rootkits and privilege escalation to get to the kernel processes d. using a virus and destroying the computer that stores authentication information.

User Plamb
by
8.0k points

1 Answer

4 votes

Answer:

a. social engineering attack

Step-by-step explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

User Vivek Pratap Singh
by
8.1k points
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.