Answer:
USB tethering involves attackers gaining unauthorized access to a device's stored data by exploiting a USB connection.
USB tethering involves attackers gaining unauthorized access to a device's stored data by exploiting a USB connection.
You may be interested in:
Cyber Security Multiple Choice Questions And Answers (MCQs)