1.

_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.

A. Cache Snooping
B. Cookie-jacking
C. Cookie Snooping
D. Cache-compromising
Answer» D. Cache-compromising


Discussion

No Comment Found