In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?
I'm not entirely sure, but I remember something about active online attacks being more about ongoing exploitation rather than exploiting unpatched vulnerabilities.
Social engineering, got it. That's the technique where the attacker tries to exploit the human element rather than technical vulnerabilities. Definitely the right answer here.
I'm not sure about this one. The NEW state could mean a few different things, and I'm not clear on the implications of the server being in a particular state. I'll need to review my notes to figure this out.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Leonie
4 months agoGlory
4 months agoCatalina
4 months agoMalcolm
4 months agoEileen
5 months agoAnglea
5 months agoAudrie
5 months agoDong
5 months agoVince
5 months agoKasandra
5 months agoTimothy
5 months agoCraig
5 months ago