CIS 333 Week 2 Quiz 3 CIS 333 Week 2 Quiz 3 | Page 4

• Question 10 When an attacker discovers a __________, he or she can use it to bypass existing security controls such as passwords, encryption, and so on. • Question 11 Which of the following is the definition of netcat? • Question 12 Malicious software can be hidden in a ________.