casi1580 casi1580 11-10-2022 Computers and Technology contestada a hacker gained access to a network through malicious email attachments. which one of these is important when talking about methods that allow a hacker to gain this access?