Identify the attack represented in the diagram below: seenagape 10 years ago Identify the attack represented in the diagram below: A. Input Validation B. Session Hijacking C. SQL Injection D. Denial-of-Service Explanation: Reference:http://en.wikipedia.org/wiki/Session_hijacking ← Previous question Next question →