Final answer:
An exploit involves the replacement of something benign with something malicious, such as spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.
Step-by-step explanation:
An exploit involves the replacement of something benign with something malicious. Examples include spoofing, man-in-the-middle attacks, rogue wireless access points, and SQL injection attacks.