Which statement best describes how most hacking is accomplished?
a) Exploiting software vulnerabilities
b) Social engineering attacks
c) Physical break-ins and theft
d) Network eavesdropping