Which option would be considered an example of a Hardware Based Exploit?

Which option would be considered an example of a Hardware Based Exploit?
A. SQL Injection
B. Social Engineering
C. Jail Breaking
D. Denial of Service

microsoft-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.