1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
12

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera

bility or has been able to repair it?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
In 1993, a group of professors and students at the University of Illinois National Center for Supercomputing Applications (NCSA)
Vladimir [108]

Answer:

The answer is "False"

Explanation:

The given statement is false, which can be described as follows:

The Netscape browser is also known as the series of the name web browsers, This browser was developed by AOL's former holding company Netscape Communicative Networks Organization.

  • It was a corporation, that has been best remembered for its Navigator web browser.  
  • It is one of the two web browsers most successful in the 1990s, that's why the given statement is false.

7 0
3 years ago
Where to buy a ps5<br> I really want one please help meh
lianna [129]

Answer:

You can buy one at gamestop, target, walmart, best buy and probably more stores

3 0
3 years ago
Read 2 more answers
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
4 years ago
Which sentences use antonyms to hint at the meaning of the bolded words? Check all that apply.
Leto [7]

Answer:

dunno

Explanation:

7 0
3 years ago
If a car's is malfunctioning, people in the car will become ill when driving long distances, especially if the windows are close
galben [10]
The Carbon Monoxide will build up in the inside of the car by venting through, causing the passengers to breathe it. It will first make them ill, then kill them. They cannot detect this gas
5 0
3 years ago
Read 2 more answers
Other questions:
  • How does making a phone call differ when using: A public phone A cell phone
    6·1 answer
  • A notebook computer usually is more expensive than a desktop computer with the same capabilities because it ____.
    6·1 answer
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • Which statement describes borders and shading ?
    13·1 answer
  • Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future pla
    15·1 answer
  • In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr
    7·1 answer
  • Sort short_names in reverse alphabetic order.
    11·1 answer
  • Debug the recursive reverseString method, which is intended to return the input String str reversed (i.e. the same characters bu
    13·1 answer
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!