Computer Science, asked by rghvd7768, 11 months ago

Trusted attackers (also known as __________________) can use cloud-based it resources for a wide range of exploitations, including the hacking of weak authentication processes, the breaking of encryption, the spamming of e-mail accounts, or to launch common attacks, such as denial of service campaigns

Answers

Answered by MERILL
0

Answer:

Ethical hackers.....

Similar questions