Select the best description of zero-day vulnerabilities. Supportyour choice by describing why your choice is the bestdescription.
A. Software vulnerabilities, typically in operating systems orweb browsers, that enable bad people to steal information from yourcomputer
B. Previously unknown flaw in software that can be used to create avulnerability
C. Software vulnerabilities that can be exploited before thesoftware vendor can fix it, and before anti-virus or otherdefensive measures can defend against it
D. Software vulnerabilities that are horded, bought, and sold onthe black market, and used to attack computer systems