An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?

A. Zero day
B. Directory traversal
C. Logic bomb
D. Session hijacking


Answer: A. Zero day

Computer Science & Information Technology

You might also like to view...

________ models software in terms similar to those that people use to describe real-world objects.

a. Object-oriented programming b. Object-oriented design c. Procedural programming d. None of the above

Computer Science & Information Technology

As with overloaded methods, ____________ must differ for constructors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Explain why e-mail servers are difficult to manage.

What will be an ideal response?

Computer Science & Information Technology

When a client requests a server-side script, a client will never see the server-side script, only the ____ that the web server software returns from the script.

A. email sent B. program executing C. HTML D. raw data requested

Computer Science & Information Technology