Free CompTIA A+ 220-1102 Practice Question

A piece of recently installed software at Crucial Technologies was compromised. After doing research, it is discovered that the software was exploited before the vendor is aware of the vulnerability. What is this kind of attack called?

  • Zero-day attack

  • On-path attack

  • Brute-force attack

  • Dictionary attack

  • Insider threat

Subscribe to avoid duplicate questions and track your progress over time

Your Score:
Software Troubleshooting
Operational Procedures
Operating Systems
CompTIA A+ 220-1102
  • Operating Systems
  • Security
    • This question is filed here
  • Software Troubleshooting
  • Operational Procedures