CompTIA CySA+ CS0-003 Practice Question
Which of the following terms describes the process of creating a usable exploit after identifying a vulnerability?
Weaponization
Buffer Overflow
Reconnaissance
Which of the following terms describes the process of creating a usable exploit after identifying a vulnerability?
Weaponization
Buffer Overflow
Reconnaissance