NANDITHATHOTA494IN NANDITHATHOTA494IN Computers and Technology Answered As we discussed in lecture the attacker can control