PrepAway - Latest Free Exam Questions & Answers

Which of the following can only be mitigated through the use of technical controls rather that user security t

Which of the following can only be mitigated through the use of technical controls rather that user
security training?

PrepAway - Latest Free Exam Questions & Answers

A.
Shoulder surfing

B.
Zero-day

C.
Vishing

D.
Trojans

Explanation:
A zero day vulnerability is an unknown vulnerability in a software application. This cannot be
prevented by user security training.
A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security
hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this

exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware,
spyware or allowing unwanted access to user information. The term “zero day” refers to the
unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the
vulnerability becomes known, a race begins for the developer, who must protect users.


Leave a Reply