Question
a.
network session hijacking
b.
passive session hijacking
c.
active session hijacking
d.
social-networking session hijacking
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.
Similar Questions
Discover Related MCQs
Q. In an _________________ attack, an attacker finds an active session & takes over that session.
View solution
Q. Session hijacking takes place at ____________ number of levels.
View solution
Q. The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.
View solution
Q. Which of the following example do not comes under network level session hijacking.
View solution
Q. In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session.
View solution
Q. Which of them is not a session hijacking tool?
View solution
Q. Which of the following is a session hijacking tool?
View solution
Q. Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking.
View solution
Q. Which of the following is not an appropriate way to compromise web servers?
View solution
Q. Which of the following is not an appropriate method of defacing web server?
View solution
Q. Which of the following is not an appropriate method of defacing web server ?
View solution
Q. _________ is one of the most widely used web server platforms.
View solution
Q. IIS stands for __________________
View solution
Q. ____________ is a tiny script that if uploaded to a web server can give hacker complete control of a remote PC.
View solution
Q. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
View solution
Q. Which of the following is not a web server attack type?
View solution
Q. ______________ tool clears the log entries in the IIS log files filtered by an IP address.
View solution
Q. CleanIISLog is not a hacking tool.
View solution
Q. Which of the following is not an appropriate countermeasure for web server hacking?
View solution
Q. Which of the following is not an appropriate countermeasure for web server hacking ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!