Which of the following is the attacker exploiting?

An attacker is exploiting a vulnerability that does not have a patch available.

Which of the following is the attacker exploiting?
A . Zero-day
B . Default permissions
C . Weak encryption
D . Unsecure root accounts

Answer: A

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments