Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session hijacking attacks?

a. Application
b. Presentation
c. Session
d. Network

ANS: C

Computer Science & Information Technology

You might also like to view...

Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?

A. Competitor B. Hacktivist C. Insider D. Organized crime.

Computer Science & Information Technology

Every item in a list must be of the same type.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology