Add to Chrome
✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
How did the attacker
manipulate the dynamics of open-source development to introduce the backdoor?
By leveraging social
engineering to gain the maintainer’s trust and control over the project
By bypassing Linux
security protocols through direct kernel modifications
By exploiting the
lack of formal review processes in open-source projects
By bribing other
developers to approve their contributions
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!