header bg

Scan QR code or get instant email to install app

Question:

You learn via a news flash on the internet that the developer of one of your key applications discovered a security hole. In two days, they will release a patch for it. Before you can install the patch, it is obvious that the vulnerability has already been exploited to gain unauthorized access to your network. What type of attack is this?

A Zero-day attack.
explanation

A zero-day attack occurs when a vulnerability is detected in a web browser or other software and attackers start using it the same day the developer finds it, bypassing the one- to two-day response time that many software providers need to release a patch. Zombie and botnet attacks occur when the victim is unaware that malware is installed on their computer. Their computer is a zombie, and a botnet attack is when numerous zombies are deployed to attack a system. Systems whose software is out-of-date and do not adhere to best practices or corporate restrictions and rules are noncompliant systems. Typically, a brute-force attack uses software that repeatedly tries passwords or codes until it finds the one that will grant access.

Related Information