CDKCDK2393 CDKCDK2393 26-08-2022 Computers and Technology contestada A hacker gained access to a network through malicious email attachments. which one of these is important when talking about methods that allow a hacker to gain this access