How does an attacker use a zero-day vulnerability during the Incursion phase?
A . To perform a SQL injection on an internal server
B . To extract sensitive information from the target
C . To perform network discovery on the target
D . To deliver malicious code that breaches the target
Answer: D
Explanation:
Reference: https://www.symantec.com/connect/blogs/guide-zero-day-exploits