Short Answer
Another approach to exploiting software vulnerabilities exploits browser vulnerabilities so that when the user views a Web page controlled by the attacker, it contains code that exploits the browser bug to download and install malware on the system without the user's knowledge or consent.This is known as a __________ and is a common exploit in recent attack kits.
Correct Answer:

Verified
Correct Answer:
Verified
Q17: In a _ attack the attacker is
Q18: A _ attack is an attack on
Q19: A _ is a computer program that
Q20: A virus, although attached to an executable
Q21: A _ attack exploits social engineering to
Q23: _ programs are used to send large
Q24: _ can result in pop-up ads or
Q25: Newer worms are limited to Windows machines
Q26: The _ method uses information contained on
Q27: A(n) _ virus is a form of