Which of the following is not one of the steps in a TCP hijacking attack?

a. Identify and find an active session.
b. Predict the sequence number.
c. Install a rootkit on the victim's system.
d. Take one of the parties offline.


ANS: C

Computer Science & Information Technology

You might also like to view...

GPS stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Replacing a CPU is usually very helpful in improving overall computer performance

Indicate whether the statement is true or false

Computer Science & Information Technology

Solver is a what-if analysis tool

Indicate whether the statement is true or false.

Computer Science & Information Technology

The ____ attribute of the element determines the number of characters that can be entered into a field.

A. maxlength B. size C. length D. max

Computer Science & Information Technology