When CQ University’s computers began acting sluggishly, computeroperators were relieved when a software trouble-shooter from DELLcalled. When he offered to correct the problem they were having, hewas given a login ID and password. The next morning, the computerswere worse. A call to DELL confirmed the university’s suspicion:someone had impersonated a DELL repairman to gain unauthorizedaccess to the system and destroy the database. CQ University wasalso concerned that the intruder had devised a program that wouldlet him get back into the system even after all the passwords werechanged. a) What techniques could the imposter have implemented tobreach the university’s internal security?____________________