Which of the following operating system penetration techniques takes advantage of the time during which a legitimate

Question:

Which of the following operating system penetration techniques takes advantage of the time during which a legitimate user is still connected to the system but is inactive?

a. Between lines entry

b. Piggybacking

c. Trojan horse

d. Spoofing

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: