Watch this video on YouTube
Which of the following terms specifically describes an attack that takes advantage of system vulnerabilities?