In what type of attack does the hacker craft a transparent page or frame over a legitimate looking page that entices the user to click something?
A. XSS
B. insecure direct object references
C. clickjacking
D. CSRF
C
Explanation: A hacker using the clickjack attack will craft a transparent page or frame over a legitimate looking page that entices the user to click something. When he does, he is really clicking on a different URL. In many cases, the site or application may entice the user to enter credentials that could be used later by the attacker.
You might also like to view...
In the queue, the back pointer is important because:
A. without it, we would have to walk a pointer through the entire queue to get to the last node, where we enqueue B. without it, we would have to walk a pointer through the entire queue to get to the last node, where we dequeue C. without it, we would have memory leak when the destructor is called D. it makes it much easier to implement the deepCopy function
A(n) ________ is a specialized computer with the sole function of storing, processing, and sending e-mail
Fill in the blank(s) with correct word
Many businesses are cutting paper waste by exporting reports and having them sent in an e-mail instead of having them printed directly from a database
Indicate whether the statement is true or false
To display the DEVELOPER tab, begin by clicking ________ in the Word Option dialog box
A) General B) Customize Ribbon C) Advanced D) Display