Correct Answer: To masquerade as non-malicious software while exploiting a system's weaknesses.
Explanation:
Note: This Question is unanswered, help us to find answer for this one
More Internet Security MCQ Questions
Internet Security MCQs | Topic-wise