header bg

Question:

A security colleague is puzzled by a recent event. An attacker successfully gained access to a workstation in the business and stole important data. Following the heist, a complete vulnerability scan was performed, and nothing was revealed. Which of the following best describes what occurred?

A The attacker took advantage of a zero-day vulnerability on the machine.
Explaination

A zero-day vulnerability is one that security personnel, vendors, and even vulnerability scanners are unaware of. It is more plausible that the attacker is employing an attack vector unknown to security staff than that he has managed to disable all security measures without informing anybody.