________ takes best advantage of an existing authenticated connection admin 10 years ago Fill in the blank with the appropriate name of the attack.________ takes best advantage of an existing authenticated connection Answer: session hijacking Explanation: ← Previous question Next question →