Practicing for User Authentication of Operating System

Questions 1 of 14
  • Q. Which of the following are forms of malicious attack?