Which option would be considered an example of a Hardware Based Exploit?
A. SQL Injection
B. Social Engineering
C. Jail Breaking
D. Denial of Service
Which option would be considered an example of a Hardware Based Exploit?
A. SQL Injection
B. Social Engineering
C. Jail Breaking
D. Denial of Service