An attack in which code is downloaded, installed, and executed on a computer without the user's permission and usually without their knowledge.

A. Drive-By Download
B. Cross-Site Scripting
C. Email header exploit
D. SQL injection