A piece of recently installed software at Crucial Technologies was compromised. After doing research, it is discovered that the software was exploited before the vendor is aware of the vulnerability. What is this kind of attack called?
The answer is a zero-day attack. A zero-day attack is one that exploits a vulnerability before it is known and any mitigation attacks have been issued from the vendor. Insider threat is not a type of attack while the other choices aren’t attacking a vulnerability in the system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a zero-day attack?
Open an interactive chat with Bash
How do zero-day attacks differ from other types of attacks?
Open an interactive chat with Bash
What can organizations do to protect against zero-day attacks?