Question: An attacker enters some simple JavaScript in a review on an online shopping site to redirect other users to a phishing website. Which attack is
An attacker enters some simple JavaScript in a review on an online shopping site to redirect other users to a phishing website. Which attack is he carrying out?
| XSS |
| SQL injection |
| Buffer overflow |
| Brute force |
Attacks targeting security holes in software unknown to the vendor:
| Zero-day attack |
| Drive-by download |
| Spyware |
| Denial of service |
Which of the following elements is NOT specified by the principle " "Lock it"" as part of the effective data security plan?
| physical security |
| electronic security |
| employee training |
| Inventory customer information |
Process of trying to induce a target to give up personal information through fraudulent emails
| Investment fraud |
| Trojan horse |
| Spyware |
| Phishing |
Software or hardware designed to block hackers from accessing your computer:
| Anti-virus |
| Keylogger |
| Antispyware |
| Firewall |
Cyber insurance coverage includes:
| online defamation |
| Loss of data stored in the cloud |
| loss of business income due to DoS attacks |
| All of the above |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
