a. Unauthorized account access |
b. Mass attack using Trojans as botnets |
c. Email spoofing and spamming |
d. Report vulnerability in any system |
Answer: Report vulnerability in any system |
a. Unauthorized account access |
b. Mass attack using Trojans as botnets |
c. Email spoofing and spamming |
d. Report vulnerability in any system |
Answer: Report vulnerability in any system |