What takes best advantage of an existing authenticated connection? admin 10 years ago Fill in the blank with the appropriate name of the attack.____________ takes best advantage of an existing authenticated connection. Answer: session hijacking Explanation: ← Previous question Next question →