•
Question 10
When an attacker discovers a __________, he or she can use it to bypass existing
security controls such as passwords, encryption, and so on.
•
Question 11
Which of the following is the definition of netcat?
•
Question 12
Malicious software can be hidden in a ________.