One month after a software developer was terminated the helpdesk started receiving calls that several employees' computers were being infected with malware. Upon further research, it was determined that these employees had downloaded a shopping toolbar. It was this toolbar that downloaded and installed the errant code. Which of the following attacks has taken place?

A. Logic bomb
B. Cross-site scripting
C. SQL injection
D. Malicious add-on


Answer: A. Logic bomb

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, Item 1 points to an anchor icon, which indicates a(n) ____.

A. SmartArt graphic B. resized image C. floating image D. inline graphic

Computer Science & Information Technology

In a shared workbook, information that is maintained about changes made in past editing sessions is called the ________

A) change history B) save history C) review history D) track history

Computer Science & Information Technology

What type of structure is used to provide instructions to infected bot computers?

A. client-server B. hive C. bot herder D. command & control

Computer Science & Information Technology

The ____ string function is used to parse (locate substrings) in a string.

A. strloc B. strlen C. strstr D. strtok E. strchr

Computer Science & Information Technology