What is a zero-day attack?

A. Attacks that come after fixes are released are called zero-day attacks.
B. Security weaknesses that open a program to attack.
C. Attacks that come before fixes are released are called zero-day attacks.
D. Aprogram that takes advantage of a vulnerability to allow the attacker to take over the computer or at least an individual account.


C. Attacks that come before fixes are released are called zero-day attacks.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Elements can be added at any location within an array after it’s created. 2) The Capacity property indicates the number of elements stored in the List. 3) LINQ is used to query collections in the same way it’s used to query arrays. 4) A LINQ query is executed when it’s created.

Computer Science & Information Technology

When you open a database, Access assumes that the database might contain something that could damage your computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What occurs when the total width of the columnar elements in a page layout exceeds the width of their containing element?

A. floating elements B. normal flow C. column drops D. clearing problems

Computer Science & Information Technology

One byte has ________ bits.

a. 4 b. 8 c. 12 d. 16

Computer Science & Information Technology