Identify the attack represented in the diagram below: Identify the attack represented in the diagram below: Identify the attack represented in the diagram below: A. Input Validation B. Session Hijacking C. SQL Injection D. Denial-of-Service Explanation: Reference:http://en.wikipedia.org/wiki/Session_hijacking Show Hint ← Previous question Next question →
B
Should be Session Fixation