When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process?

A. drive-by download
B. Web download attack
C. Web filtering
D. download filtering


Answer: A

Computer Science & Information Technology

You might also like to view...

____ measures image clarity.

A. Pixel size B. Resolution C. Bit depth D. Dot pitch

Computer Science & Information Technology

Which of the following is a risk associated with the use of private data?

A. Constant use of encryption. B. Malfunctioning hardware devices. C. Associations with groups. D. Statistical anomalies.

Computer Science & Information Technology

A(n) ____ is a use case variation that shows functions beyond those found in a base case.

A. scenario B. variation C. enlarged variation D. extend variation

Computer Science & Information Technology

What is another name for wildcard bits?

a. OSPF pass-through bits b. Area 0 selection bits c. Inverse mask bits d. Route selection bits

Computer Science & Information Technology