CIS 333 All Assignments CIS 333 All Assignments | Page 37

• Question 10 When an attacker discovers a __________, he or she can use it to bypass existing security controls such as passwords, encryption, and so on. • Question 11 Which of the following is the definition of netcat? • Question 12 Malicious software can be hidden in a ________.