Que: _____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data. a. Cache Snooping b. Cookie-jacking c. Cookie Snooping d. Cache-compromising Answer: Cookie Snooping