SSC CPO SI and ASI 2016 Paper
© examsiri.com
Question : 66 of 200
Marks:
+1,
-0
In which type of vulnerability, an unauthorised host pretends to be authorised host by meeting some authorisation criterion?
Go to Question: