An attacker used an undocumented and unknown application exploit to gain access to a file server. Which of the following BEST describes this type of attack?
A. Integer overflow
B. Cross-site scripting
C. Zero-day
D. Session hijacking
E. XML injection
Answer: C. Zero-day
You might also like to view...
The ____ structure in a computer program directs the computer to process the program instructions, one after another, in the order listed in the program.
A. sequence B. selection C. repetition D. series
Identify the letter of the choice that best matches the phrase or definition.
A. A fixed object that appears on the left or right of a block of text B. Pages that share the same layout, formatting, and styles C. Text appearance D. A single file that contains exported Web files and folders E. An image that repeats horizontally and vertically F. No distraction from page content G. Option in the CSS Properties list H. Elements that appear only once on a page I. Class-based styles J. Rollover effect
Which of the following protocols is considered stateless and utilizes TCP when communicating between a server and client?
A. IMAP B. SMTP C. HTTP D. SSH
International Issues uniquely related to E-Commerce include:
a. currency conversion b. browser version, screen resolution c. culture d. none of the above