Which of the following operating system penetration techniques takes advantage of the time during which a legitimate
Question:
Which of the following operating system penetration techniques takes advantage of the time during which a legitimate user is still connected to the system but is inactive?
a. Between lines entry
b. Piggybacking
c. Trojan horse
d. Spoofing
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: