List of questions
Related questions
Question 566 - 312-50v12 discussion
Jake, a network security specialist, is trying to prevent network-level session hijacking attacks in his company.
While studying different types of such attacks, he learns about a technique where an attacker inserts their machine into the communication between a client and a server, making it seem like the packets are flowing through the original path. This technique is primarily used to reroute the packets. Which of the following types of network-level session hijacking attacks is Jake studying?
A.
RST Hijacking
B.
Man-in-the-middle Attack Using Forged ICMP and ARP Spoofing
C.
UDP Hijacking
D.
TCP/IP Hijacking
Your answer:
0 comments
Sorted by
Leave a comment first