MCQOPTIONS
Bookmark
Saved Bookmarks
→
Cyber Security
→
Botnets in Cyber Security
→
There are ___________ types of session hijacking...
1.
There are ___________ types of session hijacking.
A.
2
B.
3
C.
4
D.
5
Answer» B. 3
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
Which of the following example do not comes under network level session hijacking.
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.
Session hijacking takes place at ____________ number of levels.
In an _________________ attack, an attacker finds an active session & takes over that session.
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.
SESSION_HIJACKING_TAKES_PLACE_AT______________NUMBER_OF_LEVELS.?$
IN_AN___________________ATTACK,_AN_ATTACKER_FINDS_AN_ACTIVE_SESSION_&_TAKES_OVER_THAT_SESSION.?$
Which of the following example do not comes under network level session hijacking.$
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply