QUESTION:86 Why would a cybercriminal avoid using a trojan in a widespread attack? C
QUESTION: 87 A cybercriminal is trying to get a foothold into an organization by exploiting a weakness in their web servers. What is the most common website vulnerability that cybercriminals can use? B
QUESTION:88 What is the most common method bots may use to extract data? C