Which of the following is being described?

An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the
vulnerability by developing new malware. After installing the malware, the attacker is provided with access to
the infected machine.
Which of the following is being described?

An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the
vulnerability by developing new malware. After installing the malware, the attacker is provided with access to
the infected machine.
Which of the following is being described?

A.
Zero-day exploit

B.
Remote code execution

C.
Session hijacking

D.
Command injection



Leave a Reply 0

Your email address will not be published. Required fields are marked *