In what type of attack does the hacker craft a transparent page or frame over a legitimate looking page that entices the user to click something?

A. XSS
B. insecure direct object references
C. clickjacking
D. CSRF


C
Explanation: A hacker using the clickjack attack will craft a transparent page or frame over a legitimate looking page that entices the user to click something. When he does, he is really clicking on a different URL. In many cases, the site or application may entice the user to enter credentials that could be used later by the attacker.

Computer Science & Information Technology

You might also like to view...

In the queue, the back pointer is important because:

A. without it, we would have to walk a pointer through the entire queue to get to the last node, where we enqueue B. without it, we would have to walk a pointer through the entire queue to get to the last node, where we dequeue C. without it, we would have memory leak when the destructor is called D. it makes it much easier to implement the deepCopy function

Computer Science & Information Technology

A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail

Fill in the blank(s) with correct word

Computer Science & Information Technology

Many businesses are cutting paper waste by exporting reports and having them sent in an e-mail instead of having them printed directly from a database

Indicate whether the statement is true or false

Computer Science & Information Technology

To display the DEVELOPER tab, begin by clicking ________ in the Word Option dialog box

A) General B) Customize Ribbon C) Advanced D) Display

Computer Science & Information Technology