nandithathota494 nandithathota494 01-10-2021 Computers and Technology contestada As we discussed in lecture the attacker can control