1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
8

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Computers and Technology
1 answer:
Nostrana [21]3 years ago
5 0

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

You might be interested in
I'm curious why I would need to know this on a school learning site.
zhannawk [14.2K]
no idea either lol, I mean school forces you to learn





..
4 0
3 years ago
Which is true about POP3 and IMAP for incoming email?
IceJOKER [234]
<h2>Answer:</h2>

Option A: Both POP3 and IMAP  keep email on an email server by default.

is the correct answer.

<h2>Explanation:</h2>

Following points will make the idea of POP3 and IMAP clear:

<h3>POP3:</h3>
  • POP3  is the acronym for Post Office Protocol 3.
  • POP3 is the method of receiving emails in which the emails received on the app can be downloaded on to the computer by having an internet connection.
  • These downloaded emails can be viewed offline whenever needed and managed as well.
  • POP3 makes it possible that the storage space of the default server do not run short as the downloaded emails are deleted from the server.
<h3>IMAP:</h3>
  • IMAP stands for Internet Message Access Protocol.
  • It is the method in which the mails are viewed and managed directly on the internet server instead of downloading them on the computer.
  • IMAP makes sure to manage the mails so carefully and timely so that unimportant mails are deleted to make sure that the storage space does not run short.
<h3>Conclusion:</h3>

So from these points we can make sure that both ways keep emails on email server but POP3 have option to download mails from server while IMAP dont have.

<h2>I hope it will help you!</h2>
8 0
3 years ago
Are u a chicken nugget!!??
creativ13 [48]
Yes. Yes I would classify myself as the nugget of the chicken thank you for asking me. 
3 0
3 years ago
Read 2 more answers
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
Tomtit [17]

Answer:

B.) Open Office Impress

Explanation:

The options are:

A.) Open Office Writer

B.) Open Office Impress

C.) an outline

D.) photographs

Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.

7 0
3 years ago
Read 2 more answers
HURRY PLEASE ITS A TEST
laiz [17]

<em>A.)</em>

<em>It's either A or D both of them stand out and make sense to me so I think that it'll be right if you choose A or D.</em>

<em>-Ɽ3₮Ɽ0 Ⱬ3Ɽ0</em>

8 0
3 years ago
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • Some financial institutions can be really bad about putting unexpected charges
    12·1 answer
  • Technological _____ is the term used to describe the merging of several technologies into a single device.
    13·1 answer
  • 6. A distribution consists of three components with frequencies 200, 250 and 300 having means
    14·1 answer
  • . If you have written the following source code:
    9·1 answer
  • Lol who look at this so funny
    6·1 answer
  • Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
    10·1 answer
  • ___signs tell you what you can or can't do, and what you must do ?
    5·2 answers
  • Which type of storage disk and disk drive can you use in the given situation?
    12·1 answer
  • Give an example of an occasion when you used logic to solve a problem
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!