Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
A. Remote exploit
B. Amplification
C. Sniffing
D. Man-in-the-middle
Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
A. Remote exploit
B. Amplification
C. Sniffing
D. Man-in-the-middle