A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user’s knowledge or consent.
Fill in the blank(s) with the appropriate word(s).
drive-by-download
Computer Science & Information Technology
You might also like to view...
Depending on which Office program you are using, the Open, Save and Save As dialog boxes will look slightly different
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ view is used to organize presentations and work with transitions between slides
A) Slide Sorter B) Outline C) Normal D) Notes page
Computer Science & Information Technology