Question 331:
Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
Answer options:
A. Remote exploit B. Amplification C. Sniffing D. Man-in-the-middle
Answer correct:
A