Which of the following must the hacker identify to perform a session hijacking attack?

A. username
B. password
C. session ID
D. SSL key


C
Explanation: The hacker would need to identify or discover the session ID of the authenticated user and could do so by guessing it or sniffing a session and stealing it.

Computer Science & Information Technology

You might also like to view...

Which version of XHTML is not backward compatible?

A. 1.0 B. 5.0 C. 2.0 D. 1.1

Computer Science & Information Technology

Which of the following utilities was native to the Linux operating system and can be used to do string searches across multiple directories?

a. GREP b. DD c. LIST d. STRINGS

Computer Science & Information Technology

By default, records in a table or query are sorted by the foreign key field

Indicate whether the statement is true or false

Computer Science & Information Technology

A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:

A. cold site B. hot site C. spare site D. warm site

Computer Science & Information Technology