1.

The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.(a) network level(b) physical level(c) application level(d) data levelI have been asked this question in final exam.I'd like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security

Answer»

The correct answer is (a) network level

The explanation is: TCP SESSION hijacking that deals with a security ATTACK on any TARGET victim’s session over a protected network. The network hijacking is implemented on the data flow of protocol SHARED by all web APPLICATIONS.



Discussion

No Comment Found

Related InterviewSolutions