Which technology is most often exploited by a hacker to spread from one system to another? seenagape 10 years ago Which technology is most often exploited by a hacker to spread from one system to another? A.SSL certificates B.Buffer overflows C.Key-based authentication in SSH D.Password-based authentication in SSH Explanation: ← Previous question Next question →