What is a zero-day attack?

A. Attacks that come before fixes are released are called zero-day attacks.
B. Aprogram that takes advantage of a vulnerability to allow the attacker to take over the computer or at least an individual account.
C. Security weaknesses that open a program to attack.
D. Attacks that come after fixes are released are called zero-day attacks.



A. Attacks that come before fixes are released are called zero-day attacks.

Computer Science & Information Technology

You might also like to view...

Which of the following is all about communicating measurements to the user?

A) Ajax B) dashboards C) stickiness D) WMP

Computer Science & Information Technology

A small photographic print inserted into a projector that uses light to project the image on a wall or a screen displayed in front of a wall is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Each programming language has its set of rules, called the program code of the language.

Indicate whether the statement is true or false

Computer Science & Information Technology

During a third-party audit, it is determined that a member of the firewall team can request, approve, and implement a new rule-set on the firewall.Which of the following will the audit team most l likely recommend during the audit out brief?

A. Discretionary access control for the firewall team B. Separation of duties policy for the firewall team C. Least privilege for the firewall team D. Mandatory access control for the firewall team

Computer Science & Information Technology