________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.
(a) Local exploits
(b) Remote exploits
(c) System exploits
(d) Network exploits
I had been asked this question in final exam.
The question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security