You are working on performing a penetration test of a company. You have discovered that
someone has placed a rogue access device in range of the company’s network and has used this
to steal credentials of employees. Which law is most applicable to this scenario?
A. 18 USC 2701
B. 18 USC 1029
C. 18 USC 1030
D. 18 USC 1050
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here