dillonmichaeld3007 dillonmichaeld3007 19-02-2024 Computers and Technology contestada A system using Discretionary Access Control (DAC) is vulnerable to which one of the following attacks?A. Trojan horseB. PhreakingC. SpoofingD. SYN flood