A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.

Fill in the blank(s) with the appropriate word(s).


drive-by-download

Computer Science & Information Technology

You might also like to view...

What are the disadvantages of using network-level broadcasting to locate resources: i) in a single Ethernet? ii) in an intranet? To what extent is Ethernet multicast an improvement on broadcasting?

What will be an ideal response?

Computer Science & Information Technology

What is a Web server, and what role does it play in the World Wide Web?

What will be an ideal response?

Computer Science & Information Technology

The method __________ appends a string s into the text area ta.

a. ta.setText(s) b. ta.appendText(s) c. ta.append(s) d. ta.insertText(s)

Computer Science & Information Technology

A compiler accepts ________ code, written in a high-level language, and returns executable ________ code that contains machine-language instructions.

a) source, object b) object, source c) assembly, object d) assembly, source

Computer Science & Information Technology