Site icon Exam4Training

Which of the following best describes a zero-day attack?

Which of the following best describes a zero-day attack?
A . Exploiting a known vulnerability without a patch.
B . Attacking systems after a vulnerability is patched.
C . Using outdated software for malicious purposes.
D . Monitoring network traffic for suspicious activity.

Answer: A

Explanation:

Zero-day attacks exploit software vulnerabilities that are unknown to vendors, leaving systems defenseless until a patch is released.

Latest 112-12 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version