Using a heuristic system to detect an anomaly in a computer's baseline, a system administrator was able to detect an attack even though the company signature based IDS and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an executable file onto the company PC from the USB port, and executed it to trigger a privilege escalation flaw. Which of the following attacks has MOST likely occurred?

A. Cookie stealing
B. Zero-day
C. Directory traversal
D. XML injection


Answer: B. Zero-day

Computer Science & Information Technology

You might also like to view...

A decision symbol in an activity diagram takes the shape of a ________.

a. Diamond. b. Rectangle. c. Circle. d. Triangle.

Computer Science & Information Technology

Which of the following is NOT among the three types of authentication mechanisms?

A. something a person knows B. something a person has C. something a person says D. something a person can produce

Computer Science & Information Technology

Dreamweaver provides many tools for working with text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Network problems are often combinations of hardware, software and operating system problems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology