How does an attacker use a zero-day vulnerability during the Incursion phase?

How does an attacker use a zero-day vulnerability during the Incursion phase?
A. To perform a SQL injection on an internal server
B. To extract sensitive information from the target
C. To perform network discovery on the target
D. To deliver malicious code that breaches the target

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.