One month after a software developer was terminated the helpdesk started receiving calls that several employees' computers were being infected with malware. Upon further research, it was determined that these employees had downloaded a shopping toolbar. It was this toolbar that downloaded and installed the errant code. Which of the following attacks has taken place?
A. Logic bomb
B. Cross-site scripting
C. SQL injection
D. Malicious add-on
Answer: A. Logic bomb
Computer Science & Information Technology
You might also like to view...
In the accompanying figure, Item 1 points to an anchor icon, which indicates a(n) ____.
A. SmartArt graphic B. resized image C. floating image D. inline graphic
Computer Science & Information Technology
In a shared workbook, information that is maintained about changes made in past editing sessions is called the ________
A) change history B) save history C) review history D) track history
Computer Science & Information Technology
What type of structure is used to provide instructions to infected bot computers?
A. client-server B. hive C. bot herder D. command & control
Computer Science & Information Technology
The ____ string function is used to parse (locate substrings) in a string.
A. strloc B. strlen C. strstr D. strtok E. strchr
Computer Science & Information Technology