What takes best advantage of an existing authenticated connection?

Fill in the blank with the appropriate name of the attack.
____________ takes best advantage of an existing authenticated connection.

Fill in the blank with the appropriate name of the attack.
____________ takes best advantage of an existing authenticated connection.

Answer: session hijacking

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *