Q: 6
In which of the following attacks does the attacker exploit vulnerabilities in a computer application
before the software developer can release a patch for them?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.