A company has identified a watering hole attack. Which of the following Best describes this type of attack?

A. Emails are being spoofed to look like they are internal emails
B. A cloud storage site is attempting to harvest user IDS and passwords
C. An online news site is hosting ads in iframes from another site
D. A local restaurant chains online menu is hosting malicious code


Answer: C. An online news site is hosting ads in iframes from another site

Computer Science & Information Technology

You might also like to view...

One way to define the critical path is that it consists of those tasks having a float of ____.

A. 0 B. -1 C. 1 D. null

Computer Science & Information Technology

To add a field to a report using the Add Existing Fields button, you must be in Design view

Indicate whether the statement is true or false

Computer Science & Information Technology

In order to look up IPv4 and IPv6 DHCP leases, what two files should be viewed??

A. ?/var/lib/dhcpd/dhcpd.leases B. ?/var/log/dhcpd/ipv4.leases C. ?/var/log/dhcpd/ipv6.leases D. ?/var/lib/dhcpd/dhcpd6.leases

Computer Science & Information Technology

Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology