_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.
(a) Cache Snooping
(b) Cookie-jacking
(c) Cookie Snooping
(d) Cache-compromising
I had been asked this question by my school principal while I was bunking the class.
My question is based upon Attack Vectors in division Understanding Attack Vectors of Cyber Security