A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

A. zero-day
B. rootkit
C. brute force
D. dictionary


Answer: A

Computer Science & Information Technology

You might also like to view...

The standard user account allows one to make global changes, install software, and configure settings

Indicate whether the statement is true or false

Computer Science & Information Technology

IRB stands for Interactive Ruby and is used to interactively submit Ruby statements for immediate processing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

A) 1/0 rewrite software. B) Drill holes in the platters and smash the pieces with a hammer. C) Hold a magnet over each platter. D) Repartition the hard drive into multiple partitions using different file systems.

Computer Science & Information Technology

What type of information is stored in the index.dat file?

a. Aiding events about who logs in the system b. Events logged by applications and programs c. List of IP addresses of computers that have connected to the system d. Internet browsing history including information about web addresses and search queries

Computer Science & Information Technology