1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
12

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera

bility or has been able to repair it?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
diamong [38]

Sorry don't understand spanish,I am sure you can get it wrong,for crying out loud you people get checks for coming to United States

3 0
3 years ago
You decide to store data in the user's browser in order to reduce the amount of data that must be downloaded. What is this proce
Lemur [1.5K]

Answer:

client-side storage

Explanation:

The process of doing this is known as client-side storage. Like the name suggests this saves data that is sent to the user's computer on that computer either as cookies or cached data. This data is then used every time that the user decides to enter the same website or access the same program from the browser. Doing this allows these websites and programs to load much faster the more times that the user decides to enter them.

5 0
3 years ago
Click cell i13 and calculate the agent commission using the base cost of the trip and a vlookup function that returns the commis
TiliK225 [7]
All you need to do is use excell.
5 0
3 years ago
All sensitive media on a laptop should be encrypted.
Inessa05 [86]

true very very true it could get stolen if not (well either way) but it is better encrypted

8 0
3 years ago
A store manager is looking at inventory and decides it is time order swim suits because the spring time is approaching. This is
Fudgin [204]

Swimsuit Trends Taking Over Instagram ... taking a careful look at our current bathing suit inventory. ... or you're just looking for some quality lounge chair time, ...

3 0
4 years ago
Other questions:
  • Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
    5·1 answer
  • Steven is in a meeting and he is sharing a graph on his monitor with fifty other people. So that the others do not need to crowd
    9·1 answer
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • Joshua needs to join in two cells together which of the following would perform the function
    14·1 answer
  • Can some please help me learn how to make a program via Binary Code?
    7·1 answer
  • A student who used a regression model that included indicator variables was upset when receiving only the following output on th
    10·1 answer
  • What is the most likely reason that a digital artist would use a program such as Autodesk Maya or Max to create 3-D images for a
    12·1 answer
  • Can someone write an essay on data storage and describe the different storages I have listed below•
    11·2 answers
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!