1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
8

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Computers and Technology
1 answer:
Nostrana [21]3 years ago
5 0

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

You might be interested in
Since the actions in a textual storyboard are often very close to actual program code, the statements in a textual storyboard ar
Kaylis [27]

Answer: Pseudo code

Explanation:Pseudo code is a false code that is written in the textual story board to make the fictional plot of the story more understandable in the layman terms for everyone.This is done to increase the readability of the code , which cannot be understood easily by the actual code.

It is implemented on the algorithms of a program in computer field so that the complex coding statements can be understood by the programmer.

7 0
3 years ago
Displays information a bout drivers, network connections, and other program-related details.
slava [35]

Answer:

library

Explanation:

hope you like it

6 0
3 years ago
Do laws ever change to help enforce cyber hacking crimes
prisoha [69]
No I don’t think so personally
5 0
3 years ago
Read 2 more answers
__________ states that network connection speeds for high-end users will increase by 50 percent per year, enabling new companies
Liula [17]

Answer:

Nielsens law

Explanation:

4 0
1 year ago
What type of stud is placed below a windowsill to support its weight
Vesnalui [34]
A <span>cripple stud is what is use for windows and doors 

</span>
6 0
3 years ago
Other questions:
  • Which of these definitions BEST explains what plagiarism is:
    14·2 answers
  • ____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man
    11·2 answers
  • Which of the following statements is false? a. Each object of a class shares one copy of the class's instance variables. b. A cl
    11·1 answer
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • How do you double space on microsoft word?
    5·1 answer
  • What is the output of the following program?
    5·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • Another one please help quick i got to go soon
    7·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·1 answer
  • 3. Coaxial/telephone cable sends<br> during the data transmission<br> signal
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!