PrepAway - Latest Free Exam Questions & Answers

Which technology is most often exploited by a hacker to spread from one system to another?

Which technology is most often exploited by a hacker to spread from one system to another?

PrepAway - Latest Free Exam Questions & Answers

A.
SSL certificates

B.
Buffer overflows

C.
Key-based authentication in SSH

D.
Password-based authentication in SSH

Explanation:


Leave a Reply