One month after a software developer was terminated the helpdesk started receiving calls that
several employees’ computers were being infected with malware. Upon further research, it was
determined that these employees had downloaded a shopping toolbar. It was this toolbar that
downloaded and installed the errant code. Which of the following attacks has taken place?
A.
Logic bomb
B.
Cross-site scripting
C.
SQL injection
D.
Malicious add-on