InterviewSolution
Saved Bookmarks
| 1. |
________ is a technique where attackers modify legitimate software to hide a malicious application. |
|
Answer» ________ is a technique where attackers MODIFY legitimate software to hide a malicious application. |
|