The following is an example of what type of vulnerability? A…

The following is an example of what type of vulnerability? A user enters a search term on Google.  The attacker tricks the valid website into feeding a malicious script to another browser to execute. Example: Pop-up window says, “Thank you, Abby, for your submission!”

You have recently run a vulnerability scan on your system. T…

You have recently run a vulnerability scan on your system. The scanner tells you that there is a compromise that you need to fix. Upon further inspection, you find that the vulnerability that was flagged does not actually exist on your system. What can best explain what happened?