InterviewSolution
Saved Bookmarks
| 1. |
_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.(a) Cache Snooping(b) Cookie-jacking(c) Cookie Snooping(d) Cache-compromisingI had been asked this question by my school principal while I was bunking the class.My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security |
|
Answer» Correct choice is (c) Cookie SNOOPING |
|