Nation-state threat actors often discover
vulnerabilities and hold on to them until they want to launch a sophisticated attack. The Stuxnet attack was an unprecedented style of attack because it used four types of vulnerability.
What is this style of attack called?
A. zero-day
B. zero-hour
C. ze
ro-sum
D. no-day
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyber weapon. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and
networks, then seeking out Siemens Step7 software.
References: