CompTIA CySA+ CS0-003 Practice Question
While reviewing the vulnerability scan results, you have identified several potential vulnerabilities. Which of these options most accurately represents an attack vector that would allow an intruder to gain access to a system without any user interaction and without physical presence?
Physical attack vector using local console access
Network-based attack vector exploiting remote services
Social engineering attack vector via phishing emails
Web-based attack vector requiring user to visit a malicious website