A network attack involves exploiting vulnerabilities in a system remotely, typically over the internet or an internal network. This type of attack can target systems, applications, or protocols that are accessible from the network, allowing attackers to carry out malicious activities such as data breaches, denial-of-service attacks, or unauthorized access.
In contrast, local attacks rely on physical or local access to the target device, requiring the attacker to be on-site or have gained physical access to the machine. Physical attacks involve direct interaction with hardware, such as stealing or manipulating devices, while adjacent network attacks pertain to targeting a different sub-network or zone that the attacker can access from a neighboring position but still necessitate some level of network proximity.
These distinctions clarify why the network attack is correctly identified as the option that requires exploiting a vulnerability remotely.