header bg

Scan QR code or get instant email to install app


Which of the following describes what Jason has done in the case that Jason, an attacker, has manipulated a customer's connection to disconnect the real customer and allow the server to think that he is the authenticated user?

A Active hijacking


Leave a Reply

Your email address will not be published.