1.

Which of the following example do not comes under network level session hijacking.(a) TCP/IP Hijacking(b) RST Hijacking(c) Domain Hijacking(d) Blind HijackingI got this question during an online interview.My enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security

Answer»

Right option is (C) Domain Hijacking

The explanation is: The network hijacking is IMPLEMENTED on the data flow of PROTOCOL shared by all web APPLICATIONS. Examples of network level hijacking are TCP/IP hijacking, RST hijacking, blind hijacking UDP hijacking etc.



Discussion

No Comment Found

Related InterviewSolutions