An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?
A.
Integer overflow
B.
Cross-site scripting
C.
Zero-day
D.
Session hijacking
E.
XML injection
12/7/2016 aiotestking.com does it again! Quite a thoughtful site and a well-written post. Nice work!
http://www.offsiderio.com.br/blog/index.php?option=com_content&view=article&id=33:exitos-profissionais-recentes&catid=1:viagens