PdfPrep.com

How does an attacker use a zero-day vulnerability during the Incursion phase?

How does an attacker use a zero-day vulnerability during the Incursion phase?
A . To perform a SQL injection on an internal server
B . To extract sensitive information from the target
C . To perform network discovery on the target
D . To deliver malicious code that breaches the target

Answer: D

Explanation:

Reference: https://www.symantec.com/connect/blogs/guide-zero-day-exploits

Exit mobile version