• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which attack is defined as an attempt to exploit software vulnerabilities that are unknown or undisclosed by the vendor?

  • man-in-the-middle
  • brute-force
  • Trojan horse
  • zero-day
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments