Which of the following types of application attacks would be used to identify malware causing
security breaches that have NOT yet been identified by any trusted sources?

A.
Zero-day
B.
LDAP injection
C.
XML injection
D.
Directory traversal
Explanation: