1.

This is an attack on a computer system that takes advantage of a particularvulnerability that the system offers to intruders.

A. Port scan
B. Denial of service
C. Exploit
D. Logic bomb
Answer» D. Logic bomb


Discussion

No Comment Found