Join the discussion
Question 1/28
What is a vulnerability called that is released before a patch comes out?
Correct Answer: C
A vulnerability that is exploited before the vendor has issued a patch or even before the vulnerability is known to the vendor is referred to as a "zero-day" vulnerability. The term "zero-day" refers to the number of days the software vendor has had to address and patch the vulnerability since it was made public-zero, in this case.
Reference:
Symantec Security Response, "Zero Day Initiative".
Reference:
Symantec Security Response, "Zero Day Initiative".
Add Comments
- Other Question (28q)
- Q1. What is a vulnerability called that is released before a patch comes out?...
- Q2. With respect to data analysis, which of the following is not a step?...
- Q3. A Virtual Private Network (VPN) requires how many Security Associations?...
- Q4. Which of the ICS/SCADA generations is considered monolithic?...
- Q5. What is used in the Modbus protocol to tell the slave to read or write?...
- Q6. When monitoring a network, you receive an ICMP type 8 packet. What does this represent?...
- Q7. Which component of the IT Security Model is attacked with interruption?...
- Q8. The NIST SP 800-53 defines how many management controls?...
- Q9. Which of the registrars contains the information for the domain owners in Latin America?...
- Q10. Which of the ICS/SCADA generations is considered networked?...
- Q11. Which of the following steps is used to reveal the IP addressing?...
- Q12. Which of the following are valid TCP flags?
- Q13. Which of the following ports are used for communications in Modbus TCP?...
- Q14. Which of the hacking methodology steps can be used to identify the applications and vendor...
- Q15. What version of SMB did the WannaCry ransomware attack?...
- Q16. What is the extension of nmap scripts?
- Q17. What is the size in bytes of the TCP sequence number in the header?...
- Q18. What form of attack uses a vector that infects a software package?...
- Q19. In what default directory (fully qualified path) does nmap store scripts?...
- Q20. Which of the IEC 62443 Security Levels is identified by a cybercrime/hacker target?...
- Q21. How many main score areas are there in the CVSS?2...
- Q22. What is the size of the AH in bits with respect to width?...
- Q23. Who developed the ModBus protocol?
- Q24. How many IPsec modes are there?
- Q25. Which of the TCP flags represents data in the packet?...
- Q26. Which of the following is known as a prebuilt directional gateway that is unidirectional?...
- Q27. What is the default size in bits of the Windows Echo Request packet?...
- Q28. Which of the following is NOT ICS specific malware?...
