Which of the following is the attacker exploiting?

Posted by: Pdfprep Category: SY0-601 Tags: , ,

An attacker is exploiting a vulnerability that does not have a patch available.

Which of the following is the attacker exploiting?
A . Zero-day
B . Default permissions
C . Weak encryption
D . Unsecure root accounts

Answer: A

Leave a Reply

Your email address will not be published.