What is a zero-day attack?
A. A program that takes advantage of a vulnerability to allow the attacker to take over the computer or at least an individual account.
B. Attacks that come after fixes are released are called zero-day attacks.
C. Security weaknesses that open a program to attack.
D. Attacks that come before fixes are released are called zero-day attacks.
D. Attacks that come before fixes are released are called zero-day attacks.
You might also like to view...
Each link in a tree node refers to a(n) ______________ or ______________ of that node.
Fill in the blank(s) with the appropriate word(s).
The Expression Creator tool helps you create complex expressions
Indicate whether the statement is true or false
____________________ is the amount of time by which an activity may be delayed from its scheduled Start date without the delay setting back the entire project.
Fill in the blank(s) with the appropriate word(s).
The only built-in operations on classes are assignment (=) and ____________________.
Fill in the blank(s) with the appropriate word(s).