A company has identified a watering hole attack. Which of the following Best describes this type of attack?
A. Emails are being spoofed to look like they are internal emails
B. A cloud storage site is attempting to harvest user IDS and passwords
C. An online news site is hosting ads in iframes from another site
D. A local restaurant chains online menu is hosting malicious code
Answer: C. An online news site is hosting ads in iframes from another site
You might also like to view...
One way to define the critical path is that it consists of those tasks having a float of ____.
A. 0 B. -1 C. 1 D. null
To add a field to a report using the Add Existing Fields button, you must be in Design view
Indicate whether the statement is true or false
In order to look up IPv4 and IPv6 DHCP leases, what two files should be viewed??
A. ?/var/lib/dhcpd/dhcpd.leases B. ?/var/log/dhcpd/ipv4.leases C. ?/var/log/dhcpd/ipv6.leases D. ?/var/lib/dhcpd/dhcpd6.leases
Key and certificate life cycle management must be in place to enable public key cryptography to be used correctly.
Answer the following statement true (T) or false (F)