CompTIA CySA+ CS0-003 Practice Question
As a cybersecurity analyst conducting a vulnerability assessment, you have identified a service running on a server that appears to be communicating with known malicious IP addresses. Further investigation suggests that this service could be exploited to gain unauthorized access to system resources or sensitive data. Which of the following attack vectors is most likely being exploited in this situation?
Supply chain attack
Watering hole attack
USB drop attack
Service Exploitation