In which of the following attacks does an attacker use a previously unknown attack technique or exploit a previously unknown vulnerability?
A. Whaling attack
B. Phishing attack
C. Replay attack
D. Zero-day attack
Answer: D. Zero-day attack
Computer Science & Information Technology
You might also like to view...
A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?
A. Signal strength B. Interference C. AP placement D. Incorrect SSID
Computer Science & Information Technology
After a virus outbreak, which of the following can be used to deploy a hotfix in a Microsoft environment? (Select TWO).
A. WSUS B. Terminal services C. Remote management cards D. Group policy E. SNMP
Computer Science & Information Technology