A victim is logged onto a popular home router forum site in order to troubleshoot some router configuration issues. The router is a fairly standard configuration and has an IP address of 192.168.1.1. The victim is logged into their router administrative interface in one tab and clicks a forum link in another tab. Due to clicking the forum link, the home router reboots. Which of the following attacks MOST likely occurred?

A. Brute force password attack
B. Cross-site request forgery
C. Cross-site scripting
D. Fuzzing


Answer: B. Cross-site request forgery

Computer Science & Information Technology

You might also like to view...

Imagine that you saw a Usenet posting with something particularly funny in it and saved the posting to a file. How would you incorporate this file into your own buffer? What if you wanted to use only a couple of paragraphs from the posting? How would you add > to the beginning of each included line?

What will be an ideal response?

Computer Science & Information Technology

If content is hard to read, in what category does the Accessibility Checker place this issue?

A) Error B) Caution C) Warning D) Tip

Computer Science & Information Technology

?In terms of e-commerce infrastructure, the Web server's required amount of storage capacity and computing power depends primarily on two things: the software that must run on the server and the quantity of content on the e-commerce site. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Bring Forward command moves a selected object to the top of a stack of objects.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology