Dexter2205 Dexter2205
  • 15-03-2024
  • Computers and Technology
contestada

When a hacker discovers a security hole in software that is unknown to the software's creator is an example of:
A) sniffing
B) social engineering
C) phishing
D) a zero-day vulnerability

Respuesta :

Otras preguntas

Who was josé martí and why did he destroy sugar mills and plantations?
What four seas surround Italy
Hipparchus, originator of trigonometry, began measuring distances between celestial bodies in the 2nd century BCE. Identify the appositive phrase.
Which of the following systems of inequalities represent the graph?
Creon’s tragic flaw causes him to __________. ignore the pleas of his son heed the advice of his son release Antigone release Ismene
Which of the following statements about narratives is true? A narrative describes events in sequence. A narrative has characters and setting but no conflict.
8P + 3q - 18 P=1/2 and Q= 7
The table shown below represents a function. Which of the following values could not be used to complete the table? -20 -15 -5
3–4+10+2q simplified
OMG PLEASE HELP!!!!! TEST SOON!!! Explain how to focus a microscope using the high-power lens. Include any safety issues you need to be aware of.