In the category of hacking action that is defined by VERIS, which three attacks can be classified under the vector attribute? (Choose three.)
- man-in-the-middle attacks
- rootkit
- VPN
- remote file injection
- command shell
- web application
- buffer overflow
Explanation & Hint:
In the category of hacking actions as defined by VERIS (Vocabulary for Event Recording and Incident Sharing), the vector attribute refers to the method or path used to conduct the attack. Among the options provided, the three attacks that can be classified under the vector attribute are:
Other options like man-in-the-middle attacks, rootkit, VPN, and buffer overflow, while relevant to hacking, are not vectors in the same sense. Man-in-the-middle attacks and buffer overflow are more specific types of attacks, a rootkit is a type of malware, and a VPN is a network security technology. The vector attribute in the context of hacking actions in VERIS typically refers to the pathways or methods of attack delivery and execution. |