Please compare and contrast two zero day exploits. Examples can be found here:
* https://www.zerodayinitiative.com/advisories/published/
* https://portswigger.net/daily-swig/zero-day
The compare and contrast can include a discussion of the vulnerability and access methods enabled by a vulnerability. Then please discuss what you think is a business best practice that might be used to protect a company from zero day exploits.