What is a zero-day exploit?
A. It is when the network is saturated with malicious traffic that overloads resources and bandwidth.
B. It is when an attacker inserts malicious code into a SQL server.
C. It is when a new network vulnerability is discovered before a fix is available.
D. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.
A. It is when the network is saturated with malicious traffic that overloads resources and bandwidth.
B. It is when an attacker inserts malicious code into a SQL server.
C. It is when a new network vulnerability is discovered before a fix is available.
D. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.