Go back to 312-38 - EC-Council Network Security Administrator

Question :-

Which of the following attacks are computer threats that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer? Each correct answer represents a complete solution. Choose all that apply.
Buffer overflow
Zero-day
Spoofing
Zero-hour

Want to practice for 312-38 - EC-Council Network Security Administrator ? Click here.