In which of the following attacks does an attacker use a previously unknown attack technique or exploit a previously unknown vulnerability?

A. Whaling attack
B. Phishing attack
C. Replay attack
D. Zero-day attack


Answer: D. Zero-day attack

Computer Science & Information Technology

You might also like to view...

To navigate to a directory above your current directory with the relative method, you use ____.

A. a forward slash (/) B. a back slash (\) C. one dot (.) D. two dots (..)

Computer Science & Information Technology

The ____________________ directory contains files copied automatically to each new user's home directory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Resource Usage view shows each resource that has assigned tasks but you must switch views to see resource ID.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The word shown in bold is used correctly in the following sentence.How will the cuts affect passenger service??

Answer the following statement true (T) or false (F)

Computer Science & Information Technology