Last Updated on August 14, 2021 by Admin 3
Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
- Remote exploit
- Amplification
- Sniffing
- Man-in-the-middle
Last Updated on August 14, 2021 by Admin 3