Using ________, attackers find vulnerabilities in the target system and then exploit those vulnerabilities.

A. privacy loss
B. social engineering
C. system and network attacks
D. information leakage

Answer: C. system and network attacks

Computer Science & Information Technology

You might also like to view...

Describe a wildcard in Access. Mention at least two wildcards that are available in Access

What will be an ideal response?

Computer Science & Information Technology

The ________ is part of a form that can be manipulated separately from other parts of the form

Fill in the blank(s) with correct word

Computer Science & Information Technology