A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
A. zero-day
B. rootkit
C. brute force
D. dictionary
Answer: A
Computer Science & Information Technology
You might also like to view...
The Convert Table to Text dialog box is used to convert an Access table to a delimited file
Indicate whether the statement is true or false
Computer Science & Information Technology
If you want to display all the records of one table regardless of whether a corresponding record is stored in a related table, you would use a(n) ____ join.
A. outer B. inner C. window D. field
Computer Science & Information Technology