What Is A Zero-Day Attack & How To Prevent Zero Day Exploit?