Once _____________ hijacks your system, it might perform different sorts of unwanted tasks.
(a) Server hacking
(b) Banner grabbing
(c) Cracking
(d) Hijacking
I have been asked this question in an internship interview.
This intriguing question originated from Attack Vectors in section Understanding Attack Vectors of Cyber Security