Which three attacks exploit vulnerabilities in software? (Choose three.)
- phishing
- Trojan horses
- worms
- viruses
- vishing
- pretexting
Exam with this question: Networking Essentials ( Version 2) – Networking Essentials 2.0 Final Exam SD
Please login or Register to submit your answer