What attack classi􀃖cation includes an XSS attack?
C. Code injection attack.
What is the most secure device or system failure option?
B. Fail-secure.
To what item or application is a malicious add-on attached?
B. Web browser.
What is the term for the security measures put in place to scare off an attacker or to ward off an attack?
A. Deterrence.
Which of a system's log files contains entries on login or logout activities, including failed login attempts?
Application log.
B. Access log.
C. Audit log.
D. Security log.