Podcast
Questions and Answers
Which security vulnerability was exploited in the scenario described?
Which security vulnerability was exploited in the scenario described?
- Cross-Site Request Forgery
- Cross-Site Scripting
- Web form input validation
- Clickjacking (correct)
What did the user click on that led to the compromise?
What did the user click on that led to the compromise?
- A link in an email (correct)
- A video of cats playing a piano
- A foreign country
- A bank account
What did the user receive the next business day?
What did the user receive the next business day?
- A call from his bank
- A foreign country
- An email from his bank (correct)
- A funds transfer
What did the email ask the user to do?
What did the email ask the user to do?
Which service in a PKI vouches for the identity of an individual or company?
Which service in a PKI vouches for the identity of an individual or company?