101k views
2 votes
An __________________ involves the replacement of something benign with something malicious - for example, spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.

User Kloewer
by
8.3k points

1 Answer

3 votes

Final answer:

An exploit involves the replacement of something benign with something malicious, such as spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.

Step-by-step explanation:

An exploit involves the replacement of something benign with something malicious. Examples include spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.

User Opetroch
by
7.9k points