A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.
Fill in the blank(s) with the appropriate word(s).
drive-by-download
You might also like to view...
What are the disadvantages of using network-level broadcasting to locate resources: i) in a single Ethernet? ii) in an intranet? To what extent is Ethernet multicast an improvement on broadcasting?
What will be an ideal response?
What is a Web server, and what role does it play in the World Wide Web?
What will be an ideal response?
The method __________ appends a string s into the text area ta.
a. ta.setText(s) b. ta.appendText(s) c. ta.append(s) d. ta.insertText(s)
A compiler accepts ________ code, written in a high-level language, and returns executable ________ code that contains machine-language instructions.
a) source, object b) object, source c) assembly, object d) assembly, source