Que: The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.

a. network level
b. physical level
c. application level
d. data level
Answer: network level

Leave a Comment