The ____ vulnerability exploits an unchecked buffer in Internet Explorer processing HTML elements such as FRAME and IFRAME elements.?

A. ?phishing
B. ?buffer overflow
C. ?HTML e-mail
D. ?remote access


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is not considered sensitive authentication data?

A) Full magnetic stripe data B) CAV2 code C) Expiration date D) CVC2 code

Computer Science & Information Technology

Most firewalls fall into the ____ category.

A. application gateway B. packet-filter C. MAC layer D. hybrid

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.

Computer Science & Information Technology

After choosing an array variable’s type in the "Insert Variable" dialog box, click the checkbox labeled ____ and initialize the variable by choosing ____.

A. is array; Array Variable B. is array; Custom Array C. is item; Item Variable D. is item; Custom Item

Computer Science & Information Technology