Which of the following best describes a zero-day attack?
A . Exploiting a known vulnerability without a patch.
B . Attacking systems after a vulnerability is patched.
C . Using outdated software for malicious purposes.
D . Monitoring network traffic for suspicious activity.
Answer: A
Explanation:
Zero-day attacks exploit software vulnerabilities that are unknown to vendors, leaving systems defenseless until a patch is released.
Latest 112-12 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund