A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability. Which of the following BEST describes this exploit?
A. Malicious insider threat
B. Zero-day
C. Client-side attack
D. Malicious add-on
Answer: B. Zero-day
Computer Science & Information Technology
You might also like to view...
The
, , and tags contain collections of rows called ____________________ groups.Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
null can be used:
(a) to indicate a variable has no real value (b) in a Boolean expression with == (c) as a placeholder (d) all of the above
Computer Science & Information Technology
To display the kernel version you're running, use the ____ command.
A. dis -k B. dis v C. uname -k D. uname -r
Computer Science & Information Technology
An administrator has replaced a faulty 1000BaseT NIC on the server switch with a new 1000BaseFX. Which of the following should the administrator do NEXT?
A. Reboot the switch to enable the new connection B. Update the logical network diagram C. Update the switch configuration logs D. Update the wiring schematics
Computer Science & Information Technology