Session hijacking is a specialized form of ____ in which a hijacker gets unauthorized control of a network session.

A. ping flooding
B. address spoofing
C. denial-of-service (DoS)
D. CGI scripting


Answer: B

Computer Science & Information Technology

You might also like to view...

To establish a default choice in a radio button group, you should use the checked attribute with the value marked.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A text value is generally used as a(n) ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can modify the Caption property to change the text that appears on the tab in Form View. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following DFS groups consists of servers, known as members, that synchronize data in folders so that when a change occurs, all group members are updated at once?

A. replication hive B. replication scope C. replication topology D. replication group

Computer Science & Information Technology