An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
A. Zero day
B. Directory traversal
C. Logic bomb
D. Session hijacking
Answer: A. Zero day
You might also like to view...
________ models software in terms similar to those that people use to describe real-world objects.
a. Object-oriented programming b. Object-oriented design c. Procedural programming d. None of the above
As with overloaded methods, ____________ must differ for constructors.
Fill in the blank(s) with the appropriate word(s).
Explain why e-mail servers are difficult to manage.
What will be an ideal response?
When a client requests a server-side script, a client will never see the server-side script, only the ____ that the web server software returns from the script.
A. email sent B. program executing C. HTML D. raw data requested