In which of the following attacks does an attacker use a previously unknown attack technique or exploit a previously unknown vulnerability?
A. Whaling attack
B. Phishing attack
C. Replay attack
D. Zero-day attack
Answer: D. Zero-day attack
You might also like to view...
To navigate to a directory above your current directory with the relative method, you use ____.
A. a forward slash (/) B. a back slash (\) C. one dot (.) D. two dots (..)
The ____________________ directory contains files copied automatically to each new user's home directory.
Fill in the blank(s) with the appropriate word(s).
Resource Usage view shows each resource that has assigned tasks but you must switch views to see resource ID.
Answer the following statement true (T) or false (F)
The word shown in bold is used correctly in the following sentence.How will the cuts affect passenger service??
Answer the following statement true (T) or false (F)