SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

IT-Sicherheit

» Start this Course
(Practice similar questions for free)
Question:

Backdoor

Author: Leonard Fourier



Answer:

- Geheime Funktionalität in einer Software - Umgehung der normalen Authentifizierung


0 / 5  (0 ratings)

1 answer(s) in total