Question 1

What kind of malware is designed to take advantage of a security hole ?

Question 2

What kind of malware is designed to take advantage of a security hole ?

Question 3

In which decade with the first transatlantic radio broadcast occur?

Congratulations! You did Great Job.