In which of the following attacks does an attacker use a previously unknown attack technique or exploit a previously unknown vulnerability?

A. Whaling attack
B. Phishing attack
C. Replay attack
D. Zero-day attack

Answer: D. Zero-day attack

Computer Science & Information Technology

You might also like to view...

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?

A. Signal strength B. Interference C. AP placement D. Incorrect SSID

Computer Science & Information Technology

After a virus outbreak, which of the following can be used to deploy a hotfix in a Microsoft environment? (Select TWO).

A. WSUS B. Terminal services C. Remote management cards D. Group policy E. SNMP

Computer Science & Information Technology