A hacker gained access to a network through malicious email attachments. Which one of these is important when talking about methods that allow a hacker to gain this access?
a. An attack surface
b. A 0-day
c. An ACL
d. An attack vector

Respuesta :

A hacker gained access to a network through malicious email attachments. An attack vector is important when talking about methods that allow a hacker to gain this access. Hackers can take advantage of system weaknesses, including the human factor, using attack vectors.

What is a sample of an attack vector?

  • Malware, viruses, email attachments, websites, pop-up ads, instant messages, text messages, and social engineering are some of the most typical attack vectors.
  • A way or method through which a hacker or attacker can reach a computer or network server in order to deliver a payload or malicious results is known as an attack vector. Hackers can take advantage of system weaknesses, including the human factor, using attack vectors.
  • Phishing is still the most common way that software, including ransomware, is spread because it works, and nothing succeeds like success.

To learn more about attack vectors refer to:

https://brainly.com/question/27962411

#SPJ1

RELAXING NOICE
Relax