Which of the following is being described?

An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing
the malware, the attacker is provided with access to the infected machine. Which of the following is being described?

An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing
the malware, the attacker is provided with access to the infected machine. Which of the following is being described?

A.
Zero-day exploit

B.
Remote code execution

C.
Session hijacking

D.
Command injection



Leave a Reply to Tyler Cancel reply1

Your email address will not be published. Required fields are marked *

eighteen − four =


Tyler

Tyler

Attacker discovered a NEW vulnerability, referring to the meaning of ZERO day. Before the vulnerability is discovered the attacker takes advantage of the new vulnerability and installs the malware. Zero day exploit.