1.

In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.

A. phishing
B. spoofing
C. hijacking
D. vishing
Answer» C. hijacking


Discussion

No Comment Found