A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.

Fill in the blank(s) with the appropriate word(s).

drive-by-download

Computer Science & Information Technology

You might also like to view...

Depending on which Office program you are using, the Open, Save and Save As dialog boxes will look slightly different

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ view is used to organize presentations and work with transitions between slides

A) Slide Sorter B) Outline C) Normal D) Notes page

Computer Science & Information Technology