1.

In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.(a) phishing(b) spoofing(c) hijacking(d) vishingI have been asked this question in unit test.My question is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security

Answer»

Correct option is (b) spoofing

Best explanation: In a spoofing attack, the attacker doesn’t actively TAKE over another user to PERFORM the attack. The most commonly used SESSION hijacking attack is IP spoofing.



Discussion

No Comment Found

Related InterviewSolutions