SSC CPO SI and ASI 2016 Paper

© examsiri.com
Question : 66 of 200
 
Marks: +1, -0
In which type of vulnerability, an unauthorised host pretends to be authorised host by meeting some authorisation criterion?
Go to Question: