In a ________, the attacker exploits vulnerabilities in a computer application before the software developer can release a patch for them.

A. payload
B. zero-day attack
C. hack value
D. vulnerability


Answer: B. zero-day attack

Computer Science & Information Technology

You might also like to view...

The #REF! error message displays when a cell no longer exists

Indicate whether the statement is true or false

Computer Science & Information Technology

The Themes gallery is displayed by clicking Themes in the:

A) Themes group on the HOME tab. B) Styles group on the HOME tab. C) Themes group on the PAGE LAYOUT tab. D) Styles group on the PAGE LAYOUT tab.

Computer Science & Information Technology

Can you apply automatic fixes when you are in Expert mode?

What will be an ideal response?

Computer Science & Information Technology

?Many companies use workgroup software, often called _________, because it enhances employee productivity and teamwork.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology