Which type of attack exploits a vulnerability that is not yet known to the vendor?
What is a zero-day exploit?
Famous cola with zero sugar added
What is Coke Zero?
Canada considered banning this device, as it claimed it is used for car theft
Flipper Zero
Forensic Took Kit (FTK)
What is the standard tool used by computer forensic experts?
A program that offers monetary rewards to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application's developer
What is a Bug/Security Bounty Program
Another word for Zero Day
O "OH" Day
Another word for the index case of the first documented patient in a disease epidemic within a population
Patient Zero
The process of reverse-engineering malware to understand its functionality
What is malware analysis?
What is the process of disguising malicious software as legitimate software?
What is obfuscation?
Refers to an exploit that requires no user interaction to successfully gain access or execution
Zero Click
Where was the concept of zero developed as a written digit in the decimal place value notation?
India
The process of applying updates to software, drivers, and firmware to protect against vulnerabilities.
What is patch management?