An attack that takes place shortly after a security hole is publicized, with no downloadable patch available, is called a(n):
A) zero-time exploit B) zero-patch exploit C) zero-hour exploit D) zero-day exploit
D
You might also like to view...
Which tool in Administrative Tools should you open if you want to view messages to troubleshoot errors?
A. Task Scheduler B. System Information C. Resource Monitor D. Event Viewer
This term describes issues for a VoIP network:
• Jitter • Network latency and packet loss • Queuing",
________ was an early innovation that helped decrease the amount time the computer wasted between jobs.
a) Batch processing b) Interactive computing c) Single-user contiguous memory allocation d) both a and b
InPrivate Browsing is a mode of Internet Explorer 8 that opens a new browser window that is isolated from such items as browser history and temporary Internet files
Indicate whether the statement is true or false