G
GIAC Certified Incident Handler
319 Questions
Question No. 1
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
Choose the correct option from the given list.
01 / 319