How does an attacker use a zero-day vulnerability during the Incursion phase?
How does an attacker use a zero-day vulnerability during the Incursion phase?
A . To perform a SQL injection on an internal server
B . To extract sensitive information from the target
C . To perform network discovery on the target
D . To deliver malicious code that breaches the target
Answer: D
Explanation:
Reference: https://www.symantec.com/connect/blogs/guide-zero-day-exploits
Latest 250-441 Dumps Valid Version with 70 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments
                 
	