header bg

Scan QR code or get instant email to install app

Question:

Which of the following describes what Jason has done in the case that Jason, an attacker, has manipulated a customer's connection to disconnect the real customer and allow the server to think that he is the authenticated user?

A Active hijacking
explanation

Comments

Leave a Reply

Your email address will not be published.

*