Attacks that aim at performing malicious acts without being noticed:
A. Stealthy approach
B. Harmful malicious approach
C. Disruptive approach
D. Covert approach
3.0k questions
3.0k answers
0 comments
76 users