1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
4 years ago
8

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Computers and Technology
1 answer:
Nostrana [21]4 years ago
5 0

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

You might be interested in
Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
salantis [7]

Answer:

/ReversedEvenOddString.java

import java.util.Scanner;

public class ReversedEvenOddString {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String s = sc.nextLine();

       String evens = "";

       String odds = "";

       for(int i = s.length()-1;i>=0;i--){

           if(i%2==1){

               odds += s.charAt(i);

           }

           else{

               evens += s.charAt(i);

           }

       }

       String res;

       if(s.length()%2==1){

           res = evens+odds;

       }

       else{

           res = odds+evens;

       }

       System.out.println(res);

   }

}

8 0
4 years ago
Question #2
Bezzdna [24]
Computational thinking inclines invokes the techniques of decomposition, latter reconstruction, abstraction & algorithms development
3 0
3 years ago
Read 2 more answers
List two ways to exit the room properties dialog box, saving changes to the room
hammer [34]

Green check mark and X button (close window).

5 0
3 years ago
What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
labwork [276]
<span>A key is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data. There are two types of cryptography, the public key and the private key. The public key uses public keys to encrypt data and private key uses private key to decrypt data. They are produced by a group of algorithms. </span>
8 0
4 years ago
Which area located at the top of the word screen includes home , insert , and page layout ?
Misha Larkins [42]

Answer:

Whats your qeustion

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • In Word, how can you tell when text is selected?
    8·1 answer
  • Which of the following software monitors a user's activities and sends the information back to another source without the user k
    11·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • Given an 10-bit two's complement binary number, what is the decimal value of the largest negative integer that can be represente
    10·1 answer
  • Sandi wants to check the average grades in her classroom. Which loop or algorithm should she use?
    8·1 answer
  • Portable Document Format is a proprietary document file type created by Adobe Systems that is compatible with most computer syst
    7·1 answer
  • The tags are always enclosed within a pair of<br>(a) curly<br>(b) square<br>(©) angular​
    6·1 answer
  • Are you familiar with measuring using a ruler? When have you ever used a ruler to measure, and who taught you how to use the rul
    13·1 answer
  • Question #2
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!