Short Answer
A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Many forms of infection can be blocked
Q35: A Trojan horse is an apparently useful
Q37: Unsolicited bulk e-mail is referred to as
Q38: A virus that attaches to an executable
Q39: The ideal solution to the threat of
Q40: _ is malware that encrypts the user's
Q41: Sometimes referred to as the "infection vector",
Q42: _ code refers to programs that can
Q44: Because _ software can block suspicious software
Q45: Metamorphic code is software that can be