As a result of ____, data can be stolen or altered.
A. extrusion
B. invasion
C. intrusion
D. port scanning
Answer: C
Computer Science & Information Technology
A. extrusion
B. invasion
C. intrusion
D. port scanning
Answer: C