The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as _____________
(a) infiltrating
(b) exploitation
(c) cracking
(d) hacking
This question was addressed to me in class test.
My doubt is from Exploits and Exploitation in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,