1.

The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.$

A. network level
B. physical level
C. application level
D. data level
Answer» B. physical level


Discussion

No Comment Found