Which of the following attacks can be used to exploit a vulnerability that was created by untrained users?
Which of the following attacks can be used to exploit a vulnerability that was created by untrained users? A. A spear-phishing email with a file attachment B. A DoS using IoT devices C. An evil twin wireless access point D.…