A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

A. zero-day
B. rootkit
C. brute force
D. dictionary

Answer: A

Computer Science & Information Technology

You might also like to view...

The Convert Table to Text dialog box is used to convert an Access table to a delimited file

Indicate whether the statement is true or false

Computer Science & Information Technology

If you want to display all the records of one table regardless of whether a corresponding record is stored in a related table, you would use a(n) ____ join.

A. outer B. inner C. window D. field

Computer Science & Information Technology