What are zero-day attacks?

What will be an ideal response?

Zero day attacks are previously unknown vulnerabilities that are exploited.

Computer Science & Information Technology

You might also like to view...

Which of the following is true about a protected worksheet?

A) It cannot be edited. B) It cannot be shared on SkyDrive. C) It cannot be saved. D) It cannot be printed.

Computer Science & Information Technology

The Internet is the infrastructure on which the Web exists.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology