When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process?
A. drive-by download
B. Web download attack
C. Web filtering
D. download filtering
Answer: A
Computer Science & Information Technology
You might also like to view...
What is another name for wildcard bits?
a. OSPF pass-through bits b. Area 0 selection bits c. Inverse mask bits d. Route selection bits
Computer Science & Information Technology
____ measures image clarity.
A. Pixel size B. Resolution C. Bit depth D. Dot pitch
Computer Science & Information Technology
Which of the following is a risk associated with the use of private data?
A. Constant use of encryption. B. Malfunctioning hardware devices. C. Associations with groups. D. Statistical anomalies.
Computer Science & Information Technology
A(n) ____ is a use case variation that shows functions beyond those found in a base case.
A. scenario B. variation C. enlarged variation D. extend variation
Computer Science & Information Technology