InterviewSolution
Saved Bookmarks
| 1. |
The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________(a) infiltrating(b) exploitation(c) cracking(d) hackingThis question was addressed to me in class test.My doubt is from Exploits and Exploitation in portion Cyber Security of Cyber Security |
|
Answer» The correct option is (b) exploitation |
|