InterviewSolution
Saved Bookmarks
| 1. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.(a) network level(b) physical level(c) application level(d) data levelI have been asked this question in final exam.I'd like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security |
|
Answer» The correct answer is (a) network level |
|