Refactoring

Post Reply
User avatar
Royal
Posts: 10566
Joined: Mon Apr 11, 2011 5:55 pm

Refactoring

Post by Royal » Sat Oct 06, 2018 7:46 pm

A downloaded hardware driver does not match the checksum from the manufacturer , yet it installs and seems to behave as it should. Months later, you learn that sensitive information from your device has been leaked online. Which term best describes this type of attack?

A. Refactoring


Post Reply