PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks allows for this impersonation?

Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records
the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials
to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this
impersonation?

PrepAway - Latest Free Exam Questions & Answers

A.
XML injection

B.
Directory traversal

C.
Header manipulation

D.
Session hijacking

Explanation:


Leave a Reply