1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
12

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera

bility or has been able to repair it?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
Which are the benefits of leveraging web technologies?
allsm [11]

Lower cost - You can leverage web technologies like FB and Google which allow you to advertise and reach billions of users relying on their services at a very low cost as compared to other mediums.  

Security – Data stored with web technology companies offers more security because it is stored in huge data centers that have high-end protection

Increase business efficiency – Web technologies can increase business efficiency and unlock value in your business functions. They can reduce time, provide critical analytics and help your business grow.

4 0
4 years ago
Read 2 more answers
A function ________ contains the statements that make up the function.
mestny [16]

Answer:

A) definition

Explanation:

3 0
3 years ago
As Alexa types a message, Outlook autosaves the message at various points. In which folder is the message located if Alexa wants
alexgriva [62]

Answer:

Draft

Explanation:

Draft is a specific folder in email that is meant to store partially finished mails and mails which has been created but is not sent .  Draft folders helps in reducing rework on the mail if one is interrupted while writing the mail. Another purpose of draft folder was that if anyone accidentally closes the  mail writing section then the content of mail is not lost and can be easily be obtained in draft folder. It also helps in tracking unsent and unfinished mail for the user.

Since, message written by Alexa is saved at different points but is not sent then if the mail is to be sent, then one needs to look for that mail in Draft folder.

5 0
3 years ago
Read 2 more answers
What is the result of expression 15 > 10 > 5 in C? What is the result of the same expression in Java?
Inessa05 [86]

Answer:

java: error

C: false

Explanation:

In Java the compiler understand that you are trying to compare an integer (15) with a boolean (10 > 5) this generate the next error:

error: bad operand types for binary operator  

In C the compiler convert (15 > 10 > 5) in (15>10) > (10>5) which is equal to TRUE > TRUE, the compiler can also read it as 1 > 1 (since 1 is TRUE and 0 is FALSE).  like 1>1 is false then C program return false.

5 0
3 years ago
A survey of results on mobile phone datasets analysis
xxMikexx [17]
PErfect! 100% Absolutely beautiful. 
6 0
3 years ago
Other questions:
  • Is Digital technology always better or should we champion or even return to innovative of analog machines and experiences? Apex
    13·1 answer
  • What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??
    12·1 answer
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
    13·1 answer
  • Write: In a five-paragraph essay that is two to three pages in length, address the
    13·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • Explain why the process of sketching in engineering might resemble a loop or a cycle.
    15·2 answers
  • Which of the following statements is correct? User data cannot be combined and shared among authorized users. In a nondatabase,
    6·1 answer
  • Which tool uses images and other visual elements to provide artistic
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!