Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system.
(a) authentications
(b) breaches
(c) integrations
(d) associations
The question was posed to me by my college professor while I was bunking the class.
The above asked question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security