Computer Science, asked by satyendrajogiyal59, 7 months ago

which type of cloud is most vulnerable to various virus attacks​

Answers

Answered by RaazAnishek
0

Answer:

Other attacks which hackers can facilitate through remote access include email phishing, third-party vendor compromise, insider threats, social engineering, and the use of vulnerable applications to compromise systems. Hackers use Common remote access tools to penetrate third-party access to merchant information ...

Similar questions