Describe a zero day attack.?

What will be an ideal response?


In a typical zero day attack, attackers look for holes in networks and OSs and exploit these weaknesses before patches are available. Vendors usually aren't aware that these vulnerabilities exist, so they haven't developed and released patches for them. Penetration testers attempt to break into networks to find undiscovered vulnerabilities and then predict where the next onslaught of network attacks will come from.?

Computer Science & Information Technology

You might also like to view...

Which of the following is not a method provided by an array?

a) Sort b) Copy c) BinarySearch d) Reverse e) None of the above

Computer Science & Information Technology

The ____ data type is a number automatically generated by Access that produces unique values for each record.

A. Number B. RecordNumber C. OLE Object D. AutoNumber

Computer Science & Information Technology

____________ ("E" or "e") displays numeric values in scientific notation.

a. Number format b. Percent format c. Currency format d. Exponential format

Computer Science & Information Technology

Which of the following statements is false?

a. A Path represents the location of a file or directory. b. Path objects open files and provide file-processing capabilities. c. Class Paths is used to get a Path object representing a file or directory location. d. The static method get of class Paths converts a String representing a file’s or directory’s location into a Path object.

Computer Science & Information Technology