Final answer:
The correct term for a way to circumvent controls in systems is an 1) 'exploit.' Hackers use it to steal sensitive data and can be thwarted by stringent security measures.
Step-by-step explanation:
The documented way to circumvent controls or take advantage of weaknesses in control systems is known as an exploit. Hackers use a variety of tactics such as phishing, SQL injection, and cross-site scripting to break into systems. They often steal sensitive data like personal information, financial records, and login credentials. The stolen data may be used for identity theft, financial fraud, or sold on the dark web. Despite the prevalence of these attacks, hacking can be reduced by implementing strong security measures like end-to-end encryption, two-factor authentication, regular software updates, and cybersecurity education for users.