babygirlgabby1254 babygirlgabby1254 30-01-2024 Computers and Technology contestada in the exploit demonstration, how did the attacker determine the network might be an ics network?