The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. Information Security Chapter 2 The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. A) WWW B) TCP C) FTP D) HTTP Answer: B Learn More : Share this Share on FacebookTweet on TwitterPlus on Google+
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.