Session hijacking is a specialized form of ____ in which a hijacker gets unauthorized control of a network session.
A. ping flooding
B. address spoofing
C. denial-of-service (DoS)
D. CGI scripting
Answer: B
You might also like to view...
To establish a default choice in a radio button group, you should use the checked attribute with the value marked.
Answer the following statement true (T) or false (F)
A text value is generally used as a(n) ________
Fill in the blank(s) with the appropriate word(s).
You can modify the Caption property to change the text that appears on the tab in Form View. _________________________
Answer the following statement true (T) or false (F)
Which of the following DFS groups consists of servers, known as members, that synchronize data in folders so that when a change occurs, all group members are updated at once?
A. replication hive B. replication scope C. replication topology D. replication group