An attacker used an undocumented and unknown application exploit to gain access to a file server. Which of the following BEST describes this type of attack?

A. Integer overflow
B. Cross-site scripting
C. Zero-day
D. Session hijacking
E. XML injection


Answer: C. Zero-day

Computer Science & Information Technology

You might also like to view...

The ____ structure in a computer program directs the computer to process the program instructions, one after another, in the order listed in the program.

A. sequence B. selection C. repetition D. series

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A fixed object that appears on the left or right of a block of text B. Pages that share the same layout, formatting, and styles C. Text appearance D. A single file that contains exported Web files and folders E. An image that repeats horizontally and vertically F. No distraction from page content G. Option in the CSS Properties list H. Elements that appear only once on a page I. Class-based styles J. Rollover effect

Computer Science & Information Technology

Which of the following protocols is considered stateless and utilizes TCP when communicating between a server and client?

A. IMAP B. SMTP C. HTTP D. SSH

Computer Science & Information Technology

International Issues uniquely related to E-Commerce include:

a. currency conversion b. browser version, screen resolution c. culture d. none of the above

Computer Science & Information Technology