List of questions
Related questions
Question 568 - 312-50v12 discussion
A security analyst is investigating a potential network-level session hijacking incident. During the investigation, the analyst finds that the attacker has been using a technique in which they injected an authentic-looking reset packet using a spoofed source IP address and a guessed acknowledgment number. As a result, the victim's connection was reset. Which of the following hijacking techniques has the attacker most likely used?
A.
TCP/IP hijacking
B.
UDP hijacking
C.
RST hijacking
D.
Blind hijacking
Your answer:
0 comments
Sorted by
Leave a comment first