Q: Name the malicious attack technique used in the following scenario:
A user visits a web site that offers a reaction speed test where the user clicks on a pop up button several times to measure the user’s reaction speed. Unknowingly to the user, an eCommerce product web page is loaded hidden underneath the game and is capturing these mouse clicks to express that the user “likes” different products on the site.
a. Click-jacking
b. Cross-site scripting
c. Buffer overflow
d. Cross-site request forgery