1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
12

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera

bility or has been able to repair it?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
artcher [175]

The publisher tab in the application control allows you to manage the various certificates that are used to sign to binaries. Publisher allow executables of a particular vendor, signed by a security certificate issued to the vendor by a Certificate Authority. Also, all applications and binary files either added to or modified on an endpoint that are signed by the certificate are automatically added to the whitelist.

3 0
2 years ago
Which of the following is the most compelling
Gemiola [76]
To compare data makes the most sense
5 0
2 years ago
Read 2 more answers
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
3 years ago
Is virtualization self monitoring
NISA [10]

Answer:

No

Explanation:

Virtual and physical metrics have to be collected and analysed to look for allocation problems such as: VM sprawl, too many VMs, or improperly provisioned VMs are occurring.

4 0
3 years ago
_________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
mart [117]

Answer: Scope creep

Explanation:

 Scope creep in the project management basically refers to the uncontrolled development or growth in the project creep. It basically occur when the project scope are not appropriately defined.

It usually involve lack of change in the control system and increase the complexity of the project. It is also has poor requirement analysis.

So, that is why it is the biggest problem we usually face in the project management.

5 0
2 years ago
Other questions:
  • Use search engines and websites to research the following WAN technologies to complete the table below:
    7·2 answers
  • Set numMatches to the number of elements in userValues (having NUM_VALS elements) that equal matchValue. Ex: If matchValue = 2 a
    6·1 answer
  • In what scenario should dhcp servers also be active dhcp clients?
    8·1 answer
  • Helpppp plsssss!!!<br><br>thanks.
    7·1 answer
  • What does social protocol means in network?
    9·1 answer
  • Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The
    8·1 answer
  • BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
    13·2 answers
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
  • ASAP BRAINLIEST!!!
    10·1 answer
  • A _____ is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!