A piece of recently installed software at Crucial Technologies was compromised. After an investigation, the security team determines that attackers exploited the vulnerability before the vendor even knew it existed or had released a patch. What is this kind of attack called?
The correct answer is zero-day attack. A zero-day attack takes advantage of a vulnerability that is unknown to the vendor or developer, so no fix or mitigation yet exists.
Brute-force attack repeatedly guesses credentials until it succeeds; it does not depend on an undisclosed software flaw.
Insider threat involves a malicious or negligent person inside the organization rather than a previously unknown software vulnerability.
On-path attack (man-in-the-middle) intercepts communications between parties, again without requiring a brand-new, undisclosed flaw.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a zero-day attack and why is it so dangerous?
Open an interactive chat with Bash
How do organizations typically protect against zero-day attacks?
Open an interactive chat with Bash
What is the difference between a zero-day vulnerability and a zero-day exploit?