Which OSI layer is responsible for establishing the TCP connection and is vulnerable to session hijacking attacks?
a. Application
b. Presentation
c. Session
d. Network
ANS: C
Computer Science & Information Technology
You might also like to view...
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?
A. Competitor B. Hacktivist C. Insider D. Organized crime.
Computer Science & Information Technology
Every item in a list must be of the same type.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology