Which hacking technique involves exploiting a vulnerability in software to gain unauthorized access to a system or network?
Phishing
Zero-day exploit
Brute force attack
Social engineering

Operating Systems Exercises are loading ...