When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a
A . zero-day attack
B . spoofing attack
C . DDoS attack.
D . brute force attack.
Answer: A
When hackers execute code against a vulnerability In the hope that It has not yet been addressed, this Is known as a
A . zero-day attack
B . spoofing attack
C . DDoS attack.
D . brute force attack.
Answer: A