An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware, the attacker is provided with access to the infected machine.Which of the following is being described?

A. Zero-day exploit
B. Remote code execution
C. Session hijacking
D. Command injection


Answer: A. Zero-day exploit

Computer Science & Information Technology

You might also like to view...

What would display if the following pseudocode was coded and executed?

``` Declare String user = "Martha and George" Display substring(user, 1, 3) ``` a. Mar b. art c. M d. a

Computer Science & Information Technology

Parental Control options are accessed through the ________ located in the Research task pane

A) Search for box B) Research options command C) Get services on Office Marketplace command D) Reference options drop down list

Computer Science & Information Technology

A ________ template is designed with the colors and images associated with a specific organization

A) custom B) presentation C) slide show D) master

Computer Science & Information Technology

Which type of USB hub might someone have on their key chain?

A) Downstream B) Upstream C) Solar-powered D) Bus-powered

Computer Science & Information Technology