1.

The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.

A. network level
B. physical level
C. application level
D. data level
Answer» B. physical level


Discussion

No Comment Found