PrepAway - Latest Free Exam Questions & Answers

Which of the following BEST describes this type of attack?

An attacker used an undocumented and unknown application exploit to gain access to a file
server. Which of the following BEST describes this type of attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Integer overflow

B.
Cross-site scripting

C.
Zero-day

D.
Session hijacking

E.
XML injection

Explanation:
The vulnerability is undocumented and unknown. This is zero day vulnerability.
A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security
hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this
exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware,
spyware or allowing unwanted access to user information. The term “zero day” refers to the
unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the
vulnerability becomes known, a race begins for the developer, who must protect users.

2 Comments on “Which of the following BEST describes this type of attack?

  1. Dugan Nash says:

    Passed yesterday with an 852.
    Study materials:
    Gibson book, Ciampa book, Professor Messer videos, CBT Nuggest videos, Exam Compass and Crucial Exams practice questions, and a few thousand questions from this site.
    Thanks to everyone who provided insightful comments.
    Good luck on the exam!




    0



    0

Leave a Reply