An attacker is exploiting a vulnerability that does not have a patch available.
Which of the following is the attacker exploiting?
A . Zero-day
B . Default permissions
C . Weak encryption
D . Unsecure root accounts
Answer: A
An attacker is exploiting a vulnerability that does not have a patch available.
Which of the following is the attacker exploiting?
A . Zero-day
B . Default permissions
C . Weak encryption
D . Unsecure root accounts
Answer: A