NANDITHATHOTA494GO NANDITHATHOTA494GO Computers and Technology Answered As we discussed in lecture the attacker can control