Which of the following BEST describes an attack that takes advantage of a computer not fully
updated with the most recent operating system patches?
A.
Software exploitation
B.
Vulnerability
C.
Brute force
D.
Spoofing
Which of the following BEST describes an attack that takes advantage of a computer not fully
updated with the most recent operating system patches?
Which of the following BEST describes an attack that takes advantage of a computer not fully
updated with the most recent operating system patches?
A.
Software exploitation
B.
Vulnerability
C.
Brute force
D.
Spoofing