List of questions
Related questions
Question 821 - N10-008 discussion
An attacker is using an unknown vulnerability that allows malicious actors to utilize the print spooler to gain system privileges on a computer. Which of the following is this scenario an example of?
A.
Honeypot
B.
Zero-day attack
C.
Internal threat
D.
External threat
Your answer:
0 comments
Sorted by
Leave a comment first