Attacks that aim at performing malicious acts without being noticed:
A. Stealthy approach
B. Harmful malicious approach
C. Disruptive approach
D. Covert approach
2.8k questions
2.8k answers
0 comments
76 users