InterviewSolution
Saved Bookmarks
| 1. |
_______________ is done only after the target user has connected to the server.(a) Server hacking(b) Banner grabbing(c) Cracking(d) HijackingI got this question in class test.The above asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security |
|
Answer» Right choice is (d) Hijacking |
|