Which of the following attacks uses techniques or vulnerabilities that have not already been discovered by cybersecurity specialists or anti-malware companies?
A) Salami
B) Logic bomb
C) TCP SYN flood
D) Zero-day