Zero-day attack exploits a security vulnerability that is not yet known or patched. Finding systems or data that are exposed to the attack is the first thing to be done to understand where the vulnerability exists.
While identifying vulnerable assets is an important step, it typically comes after evaluating the likelihood of attack. Once the likelihood is determined, organizations can focus on identifying the assets or systems that are potentially affected by the zero-day vulnerability.
Ans: C
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Deeplaxmi
Highly Voted 2 years, 7 months agoNainaNivi
Most Recent 1 month agoI_Shall_Pass
4 months, 2 weeks ago73f8ac3
5 months agoscriptkiddie
9 months, 3 weeks agoscriptkiddie
9 months, 3 weeks ago5b56aae
1 year agoPC2323
1 year, 7 months agoTTH1019
1 year, 11 months ago