1.

Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system.(a) authentications(b) breaches(c) integrations(d) associationsThe question was posed to me by my college professor while I was bunking the class.The above asked question is from Attack Vectors in section Understanding Attack Vectors of Cyber Security

Answer» CORRECT option is (a) authentications

Best explanation: TCP session hijacking that deals with a security attack on any target victim’s session over a protected network. SINCE most authentications occur at the very beginning of the TCP session, this allows hackers to GAIN access to any MACHINE.


Discussion

No Comment Found

Related InterviewSolutions