An attacker is exploiting a vulnerability that does not have a patch availablE. Which of the following is the attacker exploiting?
A. Zero-day
B. Default permissions
C. Weak encryption
D. Unsecure root accounts