The _______ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.

The _______ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. 



A) WWW
B) TCP
C) FTP
D) HTTP



Answer: B


Learn More :