Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
A.
Teardrop
B.
TCP/IP hijacking
C.
Phishing
D.
Replay
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
A.
Teardrop
B.
TCP/IP hijacking
C.
Phishing
D.
Replay