The most commonly used session hijacking attack is the _______________
(a) IP hacking
(b) IP spooling
(c) IP spoofing
(d) IP tracking
I got this question at a job interview.
Enquiry is from Attack Vectors topic in division Understanding Attack Vectors of Cyber Security