Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
A) preinstallation
B) stealth
C) malware
D) zero-day
Correct Answer:
Verified
Q5: Which of the following can spread more
Q5: _ are full programs.
A) Viruses
B) Worms
C) both
Q6: The general name for evil software is
Q7: A program that can capture passwords as
Q8: The Target attackers sold their stolen card
Q9: The general name for malware on a
Q11: Which of the following attach themselves to
Q12: The general name for a security flaw
Q14: Malware programs that masquerade as system files
Q15: Which of the following probably suffered the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents