In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session.
(a) network level
(b) physical level
(c) application level
(d) data level
I had been asked this question in an internship interview.
I would like to ask this question from Attack Vectors topic in portion Understanding Attack Vectors of Cyber Security