When an attack occurs shortly after a security hole has been found and there is no patch available, this is called a(n) ________

Fill in the blank(s) with correct word

zero-day exploit

Computer Science & Information Technology

You might also like to view...

Input masks can restrict the number of characters allowed in a field

Indicate whether the statement is true or false

Computer Science & Information Technology

Use the SmartArt graphic type ________ if you want to illustrate connections

A) hierarchy B) relationship C) pyramid D) list

Computer Science & Information Technology