An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware, the attacker is provided with access to the infected machine.Which of the following is being described?

A. Zero-day exploit
B. Remote code execution
C. Session hijacking
D. Command injection

Answer: A. Zero-day exploit

Computer Science & Information Technology

You might also like to view...

Excel has many Page Setup options. Please briefly describe each of the following: Portrait orientation, Landscape orientation, Gridlines, and Worksheet headings.

What will be an ideal response?

Computer Science & Information Technology

One of the following help options offered by Office 2013 is a search by ____.

A. reserved word B. topic C. keyword D. file name

Computer Science & Information Technology