Which of the following BEST describes a software vulnerability that is actively being used by Sara and Jane, attackers, before the vendor releases a protective patch or update?

A. Buffer overflow
B. IV attack
C. Zero day attack
D. LDAP injection


Answer: C. Zero day attack

Computer Science & Information Technology

You might also like to view...

The acronym pid stands for_________ .

a) parent id number. b) process id number. c) process is dead. d) None of the above.

Computer Science & Information Technology

You can convert a small amount of slide text and pictures into a SmartArt graphic by clicking the Convert to SmartArt Graphic button on the ____.

A. (SMARTART TOOLS DESIGN tab | Convert group) B. (HOME tab | Paragraph group) C. (HOME tab | SmartArt group) D. (SMARTART TOOLS FORMAT tab | Convert group)

Computer Science & Information Technology

When cell D4 containing the formula =A4*B5 is copied to cell E2, the formula in cell E2 is ________

A) =A4*B5 B) =B4*C5 C) =B2*C3 D) =A2*B3

Computer Science & Information Technology

In animations, faster objects can travel a greater distance between frames than slower ones.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology