exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 806 discussion

Actual exam question from CompTIA's N10-008
Question #: 806
Topic #: 1
[All N10-008 Questions]

An attacker is using an unknown vulnerability that allows malicious actors to utilize the print spooler to gain system privileges on a computer. Which of the following is this scenario an example of?

  • A. Honeypot
  • B. Zero-day attack
  • C. Internal threat
  • D. External threat
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hundo_954
Highly Voted 1 year, 4 months ago
Selected Answer: B
A zero-day attack exploits a vulnerability that is unknown to the software vendor or developers, meaning there is no patch or fix available at the time of the attack. The term "zero-day" refers to the fact that the developers have zero days to fix the issue because it is already being exploited in the wild
upvoted 8 times
...
a87d6a4
Most Recent 11 months, 1 week ago
Selected Answer: B
A zero-day attack involves exploiting a vulnerability that is unknown to the software vendor or the general public. Since the vulnerability in the print spooler is unknown and being used by the attacker to gain system privileges, it qualifies as a zero-day attack.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...