A ________ attack is an attack that is made before attack signatures for the threat are defined. a. anomaly based b. vulnerability based c. zero-day d. stealth