Which classification of exploit does an attacker use to gain access to a physically-secured device?
A . remote
B . local
C . USB
D . evil maid
Answer: A
Which classification of exploit does an attacker use to gain access to a physically-secured device?
A . remote
B . local
C . USB
D . evil maid
Answer: A