Respuesta :

Answer:

The answer is "computer network exploitation"

Explanation:

It is a malware code, which is gains from a safety or application vulnerability. It also enables an attacker to gain entry of an infrastructure sufficiently and gain high rights and benefits and to move wider through the system.

  • In certain instances, a multi-component strike can include an encryption method.
  • In other words, we can say that it is a method, in which networks are destroying the location of machines to obtain and collected data.