Respuesta :
Answer:
Both are used to disrupt network service
Cyber terrorists can use malware as a weapon
Both involve the use of illegal software
Network risk analysts work to prevent both
All are valid.
Answer:
Its all four
Explanation:
edg2021
Id k why the other person got b ad rati ngs, because it is true and they both do all of these things.