List of questions
Related questions
Question 308 - 312-38 discussion
Which of the following attacks are computer threats that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer? Each correct answer represents a complete solution. Choose all that apply.
A.
Buffer overflow
B.
Zero-day
C.
Spoofing
D.
Zero-hour
Your answer:
0 comments
Sorted by
Leave a comment first