What technique does Jimmy use to compromise a database?
Indicate the reason Router RT-1 chooses this “best” path.