Assignment:
Research and identify 0-day exploits. Why are these types of exploits especially dangerous to networks and technology? What are some mitigation tactics network defenders could use to help prevent this type of attack?
150 to 200 words
1 scholarly source