1.

It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

A. security exploit
B. vulnerability scanner
C. packet sniffer
D. rootkit
Answer» B. vulnerability scanner


Discussion

No Comment Found