Which of the following is an approach that hackers use to gain unauthorized access?

A)

network sniffing
B)

using Trojan horses
C)

using viruses
D)

All of the above

D

Business

You might also like to view...

The Foreign Corrupt Practices Act does not allow for "facilitating payments."

Indicate whether the statement is true or false.

Business

When using the nominal group technique, a group solicits the opinions of experts by mail and then compiles those opinions in order to discover the best solution to a problem

Indicate whether the statement is true or false

Business