An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware, the attacker is provided with access to the infected machine.Which of the following is being described?
A. Zero-day exploit
B. Remote code execution
C. Session hijacking
D. Command injection
Answer: A. Zero-day exploit
Computer Science & Information Technology
You might also like to view...
Excel has many Page Setup options. Please briefly describe each of the following: Portrait orientation, Landscape orientation, Gridlines, and Worksheet headings.
What will be an ideal response?
Computer Science & Information Technology
One of the following help options offered by Office 2013 is a search by ____.
A. reserved word B. topic C. keyword D. file name
Computer Science & Information Technology