List of questions
Related questions
Question 61 - ECSS discussion
Bob, a professional hacker, targeted an organization to launch attacks. Bob gathered information such as network topology and a list of live hosts. Based on the collected information, he launched further attacks over the organization's network.
Identify the type of network attack Bob initiated on the target organization in the above scenario.
A.
Session hijacking
B.
Buffer overflow
C.
Data modification
D.
Enumeration
Your answer:
0 comments
Sorted by
Leave a comment first