An attacker discovers a new vulnerability in an enterprise application. The attacker takes
advantage of the vulnerability by developing new malware. After installing the malware the
attacker is provided with access to the infected machine. Which of the following is being
described?

A.
Zero-day exploit
B.
Remote code execution
C.
Session hijacking
D.
Command injection