aedupsmusic6727 aedupsmusic6727 03-01-2023 Computers and Technology Answered A hacker gained access to a network through malicious email attachments. which one of these is important when talking about methods that allow a hacker to gain this access