in Technology by (1.8m points)
________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

1 Answer

0 votes
by (1.8m points)

________ is a technique where attackers modify legitimate software to hide a malicious application.

Wipers

Exploits

Code caves

Weaponized documents

Related questions

0 votes
asked Nov 2, 2021 in Education by JackTerrance (1.8m points)
...