1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
8

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Computers and Technology
1 answer:
Nostrana [21]3 years ago
5 0

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

You might be interested in
Compare entertainment applications to social media applications.
ladessa [460]
A. both allow user to stay current with the latest information.
4 0
3 years ago
Read 2 more answers
What are some positive impacts technology has on the environment?​
dsp73

Answer:

<u>technology</u> has enabled us to capture useful heat through devices such as solar panels

Explanation:

<h3 />
7 0
3 years ago
Read 2 more answers
What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
babymother [125]

Answer:

SharePoint Server

Explanation:

One drive you are not being provided with the opportunities like the versioning, check-outs and content approval. However, through SharePoint Server, you are being leveraged with all these features. Through versioning, you can update the document anytime, and also keep track of previous versions as well as the changes that you are making. Through content approval, you can ensure various members have approved permission privilege with them regarding the publication of the content.

Through checkout and check-ins the users can have control ob the new versions of the document as well as while the check-in the document, they can comment on the changes they have made.

6 0
4 years ago
Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
Llana [10]

Answer:

1 - Select the slide you want to move

2- Hold down the mouse button

3- Drag the slide where you want it

4 - NA

5- NA

6- NA

Explanation:

1 - Select the slide you want to move

it allows us to select the slide which we want to move by just clicking left mouse button

2- Hold down the mouse button

it allows the selected slide to stick with cursor

3- Drag the slide where you want it

It allows the slide stick with the cursor to drag it by moving the cursor to the required position

4 - NA (Choose move from the toolbox menu)

There is on toolbox against the slide as toolboxes are only available within a slide that is what we are writing on the slides

5- NA (Enter the slide position you want)

There is no command line in which we may enter the slide position to move the slide to a different serial number

6- NA (Switch to the Notes view)

Switching to notes view allows us to write notes with the corresponding slide whereas it doesn't do anything related to moving the slide

5 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Other questions:
  • An increase in Consumption will ___________ in the Classical Model of Aggregate Demand.
    13·1 answer
  • How many apostrophes or quotation marks in a row should you use to begin and end a multi-line string?
    14·2 answers
  • If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?
    11·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • Translate each statement into a logical expression. Then negate the expression by adding a negation operation to the beginning o
    15·1 answer
  • sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the pla
    9·2 answers
  • What is Error Code: 232011
    11·2 answers
  • Do you guys answer questions about cyber security?
    10·1 answer
  • Write the translator of third generation language​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!