Q. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (Solved)

1. security exploit

2. vulnerability scanner

3. packet sniffer

4. rootkit

  • a. security exploit
Subscribe Now

Get All Updates & News