a hacker gained access to a network through malicious email attachments. which one of these is important when talking about methods that allow a hacker to gain this access?