With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth.
(a) network session hijacking
(b) passive session hijacking
(c) active session hijacking
(d) social-networking session hijacking
This question was addressed to me in an online interview.
Query is from Attack Vectors topic in section Understanding Attack Vectors of Cyber Security