ECCouncil Exam Questions

________ takes best advantage of an existing authenticated connection

Fill in the blank with the appropriate name of the attack.
________ takes best advantage of an existing authenticated connection

Answer: session hijacking

Explanation: