Which of the following?

A local exploit requires which of the following?
A. physical access to the vulnerable system
B. access to the same IP subnet as the vulnerable system
C. prior access to the vulnerable system
D. access to the same domain as the vulnerable system

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.