A particular attack is named this way because these attacks exploit system vulnerabilities?
________. Denial of Service (DoS) attack
2) Man-in-the-middle (MitM) attack
3) Buffer overflow attack
4) Zero-day exploit attack

Answer :

Other Questions