A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________.

A. Tailgating
B. Clickjacking
C. Phishing
D. Spear phishing
E. Cross-site request forgery


Answer: B. Clickjacking

Computer Science & Information Technology

You might also like to view...

Discuss the different number formats that can be used in Microsoft Excel 2016.

What will be an ideal response?

Computer Science & Information Technology

________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information

A) Spoofing B) Tampering C) Repudiation D) Pharming

Computer Science & Information Technology

Of all the DSL standards, which is the most commonly in use today?

a. ADSL b. VDSL c. SDSL d. G.Lite

Computer Science & Information Technology

You will commonly hear a switched network called a(n) ____________________ domain to contrast it to the ancient hub based networks with their collision domains.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology