cruzheidy7826 cruzheidy7826 10-02-2022 Computers and Technology contestada ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propagation worms