In an _________________ attack, an attacker finds an active session & takes over that session.
(a) network session hijacking
(b) passive session hijacking
(c) active session hijacking
(d) social-networking session hijacking
I have been asked this question during an internship interview.
My question comes from Attack Vectors in section Understanding Attack Vectors of Cyber Security