Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Posted by: Pdfprep Category: GISP Tags: , ,

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
A . Piggybacking
B . Hacking
C . Session hijacking
D . Keystroke logging

Answer: C

Leave a Reply

Your email address will not be published.