When an attack occurs shortly after a security hole has been found and there is no patch available, this is called a(n) ________
Fill in the blank(s) with correct word
zero-day exploit
Computer Science & Information Technology
You might also like to view...
Input masks can restrict the number of characters allowed in a field
Indicate whether the statement is true or false
Computer Science & Information Technology
Use the SmartArt graphic type ________ if you want to illustrate connections
A) hierarchy B) relationship C) pyramid D) list
Computer Science & Information Technology