Which of the following must the hacker identify to perform a session hijacking attack?
A. username
B. password
C. session ID
D. SSL key
C
Explanation: The hacker would need to identify or discover the session ID of the authenticated user and could do so by guessing it or sniffing a session and stealing it.
You might also like to view...
Which version of XHTML is not backward compatible?
A. 1.0 B. 5.0 C. 2.0 D. 1.1
Which of the following utilities was native to the Linux operating system and can be used to do string searches across multiple directories?
a. GREP b. DD c. LIST d. STRINGS
By default, records in a table or query are sorted by the foreign key field
Indicate whether the statement is true or false
A location that has all the equipment installed but does not have active Internet or telecommunications facilities, and does not have current backups of data, is an example of a:
A. cold site B. hot site C. spare site D. warm site