One month after a software developer was terminated, the helpdesk started receiving calls that several
employees’ computers were being infected with malware. Upon further research, it was determined that these
employees had downloaded a shopping toolbar. It was this toolbar that downloaded and installed the errant
code. Which of the following attacks has taken place?
A.
Logic bomb
B.
Cross-site scripting
C.
SQL injection
D.
Malicious add-on