a. Remote Unauthorised access |
b. Inserting malware loaded USB to a system |
c. SQL Injection on SQL vulnerable site |
d. DDoS (Distributed Denial of Service) attack |
Answer: Inserting malware loaded USB to a system |
a. Remote Unauthorised access |
b. Inserting malware loaded USB to a system |
c. SQL Injection on SQL vulnerable site |
d. DDoS (Distributed Denial of Service) attack |
Answer: Inserting malware loaded USB to a system |