Question: . . . . . . . . . . . . . . . . . . . . . . . . .
gaining access to system or network using known or previously unknownnewly discovered access mechanism
a
Logic Bomb
b
Back doors
c
Virus
d
Trojan horse
e
None of thes
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
