Which of the following BEST describes a software vulnerability that is actively being used by Sara and Jane, attackers, before the vendor releases a protective patch or update?
A. Buffer overflow
B. IV attack
C. Zero day attack
D. LDAP injection
Answer: C. Zero day attack
You might also like to view...
The acronym pid stands for_________ .
a) parent id number. b) process id number. c) process is dead. d) None of the above.
You can convert a small amount of slide text and pictures into a SmartArt graphic by clicking the Convert to SmartArt Graphic button on the ____.
A. (SMARTART TOOLS DESIGN tab | Convert group) B. (HOME tab | Paragraph group) C. (HOME tab | SmartArt group) D. (SMARTART TOOLS FORMAT tab | Convert group)
When cell D4 containing the formula =A4*B5 is copied to cell E2, the formula in cell E2 is ________
A) =A4*B5 B) =B4*C5 C) =B2*C3 D) =A2*B3
In animations, faster objects can travel a greater distance between frames than slower ones.
Answer the following statement true (T) or false (F)