Identify the attack represented in the diagram below:
A.
Input Validation
B.
Session Hijacking
C.
SQL Injection
D.
Denial-of-Service
Explanation:
Reference:
http://en.wikipedia.org/wiki/Session_hijacking
Identify the attack represented in the diagram below:
A.
Input Validation
B.
Session Hijacking
C.
SQL Injection
D.
Denial-of-Service
Explanation:
Reference:
http://en.wikipedia.org/wiki/Session_hijacking
B
Should be Session Fixation