A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

A. address spoofing exploit
B. online intrusion
C. brute force attack
D. rogue antivirus

Answer: B

Computer Science & Information Technology

You might also like to view...

Web developers have a collection of various ____, with CSS, for common layouts such as two-column and three-column designs.

A. indices B. templates C. wizards D. baselines

Computer Science & Information Technology

Some e-businesses that generate revenue from advertising charge____ fees for certain premium services.

A. personalization B. subscription C. infomediary D. affiliate

Computer Science & Information Technology