Using ________, attackers find vulnerabilities in the target system and then exploit those vulnerabilities.
A. privacy loss
B. social engineering
C. system and network attacks
D. information leakage
Answer: C. system and network attacks
Computer Science & Information Technology
You might also like to view...
Describe a wildcard in Access. Mention at least two wildcards that are available in Access
What will be an ideal response?
Computer Science & Information Technology
The ________ is part of a form that can be manipulated separately from other parts of the form
Fill in the blank(s) with correct word
Computer Science & Information Technology