CompTIA Exam Questions

Which of the following attacks allows for this impersonation?

Joe, a user, in a coffee shop is checking his email over a wireless network. An attacker records
the temporary credentials being passed to Joe’s browser. The attacker later uses the credentials
to impersonate Joe and creates SPAM messages. Which of the following attacks allows for this
impersonation?

A.
XML injection

B.
Directory traversal

C.
Header manipulation

D.
Session hijacking

Explanation: