A piece of recently installed software at Crucial Technologies was compromised. After doing research, it is discovered that the software was exploited before the vendor is aware of the vulnerability. What is this kind of attack called?
Zero-day attack
On-path attack
Brute-force attack
Dictionary attack
Insider threat
Security | |
Software Troubleshooting | |
Operational Procedures | |
Operating Systems |