A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
A. address spoofing exploit
B. online intrusion
C. brute force attack
D. rogue antivirus
Answer: B
Computer Science & Information Technology
You might also like to view...
Web developers have a collection of various ____, with CSS, for common layouts such as two-column and three-column designs.
A. indices B. templates C. wizards D. baselines
Computer Science & Information Technology
Some e-businesses that generate revenue from advertising charge____ fees for certain premium services.
A. personalization B. subscription C. infomediary D. affiliate
Computer Science & Information Technology