List of questions
Related questions
Question 508 - SY0-601 discussion
An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding credit card statement with unusual purchases. Which of the following attacks took place?
A.
On-path attack
B.
Protocol poisoning
C.
Domain hijacking
D.
Bluejacking
Your answer:
0 comments
Sorted by
Leave a comment first