Q. This is an attack on a computer system that takes advantage of a particularvulnerability that the system offers to intruders. (Solved)
1. Port scan
2. Denial of service
3. Exploit
4. Logic bomb
- c. Exploit
1. Port scan
2. Denial of service
3. Exploit
4. Logic bomb