What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?
A. poison add-on
B. drive-by-download
C. targeted spamming
D. corrupt plug-in
Answer: B
You might also like to view...
Given the structure type and variable definitions
``` struct ShoeSize { char width; int number; }; struct ShoeType { char style; ShoeSize size; double price; }; ShoeType shoe1, shod2; ``` What type do these variables have? a) shoe1.style b) shoe2.size c) shoe1.size.width d) shoe2.price e) shoe1.size.number
What provides periodic updates of what is occurring in the business?
A) performance reports B) records C) reports used for decision making D) data capture forms
The ____ Web site feature is used to configure the dll files, code files, and other files used to fulfill client requests.
A. object mappings B. file mappings C. handler mappings D. application mappings
PowerPoint's ____ determine the default characteristics of slide objects.
A. templates B. shapes C. themes D. transitions