In the category of hacking action that is defined by VERIS, which three attacks can be classified under the variety attribute? (Choose three.)
- man-in-the-middle attacks
- rootkit
- remote file inclusion
- VPN
- command shell
- web application
- buffer overflow
Explanation & Hint:
In the category of hacking actions as defined by VERIS (Vocabulary for Event Recording and Incident Sharing), which covers various methods of technical intrusion, the three attacks that can be classified under the variety attribute are:
Other options like rootkit, VPN, command shell, and web application, while related to cybersecurity, describe different concepts or tools rather than specific types of hacking attacks. Rootkit is a type of malware, VPN is a network security technology, command shell is an interface for system access, and web application refers to a type of software. |