The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.
(a) network level
(b) physical level
(c) application level
(d) data level
I have been asked this question in final exam.
I'd like to ask this question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security