Georgia Tech uses Duo to combat a variety of attacks, includ…
Georgia Tech uses Duo to combat a variety of attacks, including phishing. Which of the following attack(s) make the second factor provided by Duo (receiving a response from the notification sent to a registered phone number), ineffective in securing user accounts at Georgia Tech. I. Shoulder surfing of user passwords.II. SIM swapping where an attacker successfully tricks a mobile phone provider into transferring a targeted victim’s phone number to a SIM card they control. III. Theft of victim phone which has an easy to guess PIN to unlock it.