Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
A . Piggybacking
B . Hacking
C . Session hijacking
D . Keystroke logging
Answer: C
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
A . Piggybacking
B . Hacking
C . Session hijacking
D . Keystroke logging
Answer: C