Exploit vulnerabilities in a computer system to gain access to it is called
Answers
Answered by
10
Computing...
Hope it helps
Similar questions