_______________ is done only after the target user has connected to the server.
(a) Server hacking
(b) Banner grabbing
(c) Cracking
(d) Hijacking
I got this question in class test.
The above asked question is from Attack Vectors in portion Understanding Attack Vectors of Cyber Security