QuestionAugust 11, 2025

When an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software, a(n) __ occurs. A address spoofing exploit B online intrusion C brute force attack D rogue antivirus infection

When an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software, a(n) __ occurs. A address spoofing exploit B online intrusion C brute force attack D rogue antivirus infection
When an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in
hardware or software, a(n) __ occurs.
A address spoofing exploit
B online intrusion
C brute force attack
D rogue antivirus infection

Solution
4.1(271 votes)

Answer

B online intrusion Explanation 1. Identify the correct term An unauthorized access to a digital device via Internet by exploiting vulnerabilities is typically referred to as an "online intrusion."

Explanation

1. Identify the correct term<br /> An unauthorized access to a digital device via Internet by exploiting vulnerabilities is typically referred to as an "online intrusion."
Click to rate:

Similar Questions