The correct response that refers to an attempt to compromise a device by gaining unauthorized access is:
hacking
(1 point)
Responses
infecting a computer with a virus
infecting a computer with a virus
hacking
hacking
using quotation marks in a search engine
using quotation marks in a search engine
sending malware
sending malware
1 answer
The correct response that refers to an attempt to compromise a device by gaining unauthorized access is:
hacking