Nandithathota494go Nandithathota494go Computers and Technology Answered As we discussed in lecture the attacker can control