CompTIA CySA+ CS0-003 Practice Question
While reviewing the vulnerability scan results, you have identified several potential vulnerabilities. Which of these options most accurately represents an attack vector that would allow an intruder to gain access to a system without any user interaction and without physical presence?
Social engineering attack vector via phishing emails
Physical attack vector using local console access
Web-based attack vector requiring user to visit a malicious website
Network-based attack vector exploiting remote services