A local exploit requires which of the following?
A. physical access to the vulnerable system
B. access to the same IP subnet as the vulnerable system
C. prior access to the vulnerable system
D. access to the same domain as the vulnerable system
A local exploit requires which of the following?
A. physical access to the vulnerable system
B. access to the same IP subnet as the vulnerable system
C. prior access to the vulnerable system
D. access to the same domain as the vulnerable system