An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO's office. The attacker was in the CEO's office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?
Lashawnda
16 days agoAlease
1 days agoLenny
18 days agoAriel
23 days agoMozell
3 days agoGracia
1 months agoDeonna
22 days agoLacey
1 months agoCorinne
1 months agoArmando
2 months agoSarah
2 months agoJarod
23 days agoDarrin
28 days agoCorinne
2 months ago