when u s leasing usl computers began acting sluggishly computer operators were relieved when a software troubleshooter from ibm called/
a. What techniques might the impostor have employed to breach USL’s internal security?
b. What could USL do to avoid these types of incidents in the future?