1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
12

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera

bility or has been able to repair it?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
3 0

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
Do software engineers save millions of dollars in usa
SCORPION-xisa [38]
Yes. They make a lot of money. So eventually after saving your Money, you will make a least 1 million dollars or more.
4 0
3 years ago
Which structural adaptation would help a plant survive better in a shady environment?
Aleks04 [339]
C. Large Leaves

Explanation:
Large leaves enable the plant to absorb more of the scarce sunlight it recieves, so it can create enough nutrients for it to survive. Plants need sunlight to perform photosynthesis. Photosynthesis is when a plant takes in sunlight and turns it into food for itself.

Hope this helped!!
4 0
3 years ago
Read 2 more answers
A major weakness of a lot of file processing systems is that ____.
Gnesinka [82]

They are several weaknesses or disadvantages of file processing systems but the major weakness is data redundancy and inconsistency. By data redundancy, I mean duplication of data. There are no better methods to validate insertion of duplicate data in file systems. Data redundancy can also increase the chance for errors.






7 0
4 years ago
Which chart element provides the boundaries of the graphic?
slava [35]
If your choices are the following:
<span>A. Legend
B. Chart area
C. Slices
D. Chart elements

Then the answer is letter B. </span>Chart area is the boundary that contains all the chart and all its elements including the chart titles, legends, plot area, labels, etc. 
4 0
4 years ago
Create an application named TestClassifiedAd that instantiates and displays at least two ClassifiedAd objects. A ClassifiedAd ha
arlik [135]

Answer:

Following is given the code with all necessary descriptions as comments in it. The output is also attached under the code. I hope it will help you!

Explanation:

5 0
3 years ago
Other questions:
  • What are some common characteristics of jobs in this career cluster? check all that apply
    10·2 answers
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • Microsoft access does not create n:m relationships because microsoft access creates databases based on
    7·1 answer
  • Explain how applying different network topologies could have an impact on the security of a network
    11·1 answer
  • What statement would you use to print the phrase Hello, world and then start a new line?
    8·1 answer
  • The proper hand position for keyboarding.
    7·1 answer
  • How do you program a computer
    7·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • Why would an information systems security practitioner want to see network traffic on both internal and external network traffic
    5·1 answer
  • Big Chungus is god. prove me wrong.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!