shhh84051 shhh84051 23-04-2024 Computers and Technology Answered A hacker tunneling set up using an inbound connection must "hijack" an existing open port or reconfigure the firewall to open another port for use by the tunnel.a. True b. False