__________________ is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.
Every computer system has __________ TCP and ______________ UDP ports. The first _________ are said to be well-known ports.
What security problem most likely exists if an operating system permits executable objects to be used simultaneously by multiple users without a refresh of the objects?