The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.?
A. ?phishing
B. ?buffer overflow
C. ?HTML e-mail
D. ?remote access
Answer: B
You might also like to view...
Which of the following is not considered sensitive authentication data?
A) Full magnetic stripe data B) CAV2 code C) Expiration date D) CVC2 code
Most firewalls fall into the ____ category.
A. application gateway B. packet-filter C. MAC layer D. hybrid
Answer the following statement(s) true (T) or false (F)
A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.
After choosing an array variable’s type in the "Insert Variable" dialog box, click the checkbox labeled ____ and initialize the variable by choosing ____.
A. is array; Array Variable B. is array; Custom Array C. is item; Item Variable D. is item; Custom Item