Train employees in secure procedurewhen a hacker discovers, and exploits a flaw in a piece of software before the developer can fix it, it is known as a _______________________ attack. due to the sophistication and enormity of this type of attack, it is becoming common that such type of attack will succeed.s and ensure they are followed.