Which of the following is not one of the steps in a TCP hijacking attack?
a. Identify and find an active session.
b. Predict the sequence number.
c. Install a rootkit on the victim's system.
d. Take one of the parties offline.
ANS: C
Computer Science & Information Technology
You might also like to view...
GPS stands for ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Replacing a CPU is usually very helpful in improving overall computer performance
Indicate whether the statement is true or false
Computer Science & Information Technology
Solver is a what-if analysis tool
Indicate whether the statement is true or false.
Computer Science & Information Technology
The ____ attribute of the element determines the number of characters that can be entered into a field.
A. maxlength B. size C. length D. max
Computer Science & Information Technology