Computer Science, asked by aradhya7570, 4 months ago

looks for vulnerable able machines within computer network. open full picture​

Attachments:

Answers

Answered by laasya54
2

Answer:

Throjan horse

Please mark me brainliest answer

Similar questions