austin8274 austin8274 04-06-2024 Computers and Technology Answered An adverse action where someone seeks unauthorized entry into a system or to disrupt its operations is called an ______.