Which of the following BEST describes this type of attack?

An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?

An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?

A.
Integer overflow

B.
Cross-site scripting

C.
Zero-day

D.
Session hijacking

E.
XML injection

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *