Q. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
β
Correct Answer: (A)
security exploit
You must be Logged in to update hint/solution