1.

________ is a technique where attackers modify legitimate software to hide a malicious application.

Answer»

________ is a technique where attackers MODIFY legitimate software to hide a malicious application.
Choose the CORRECT OPTION from below list
(1)Wipers
(2)Weaponized documents
(3)Code caves
(4)Exploits

Answer:-(3)Code caves



Discussion

No Comment Found