List of questions
Related questions
Question 425 - 312-50v12 discussion
Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?
A.
DNS rebinding attack
B.
Clickjacking attack
C.
MarioNet attack
D.
Watering hole attack
Your answer:
0 comments
Sorted by
Leave a comment first