Section 5.8 Review Questions
-
What can MAC address spoofing allow an attacker to do? What steps can be taken to mitigate this risk?
-
What is the difference between horizontal and vertical privilege escalation? Give an example of each.
-
What is XSS and how can it be used in an attack?
You have attempted 1 of 1 activities on this page.