Which attack method involves assuming the identity of a high-privilege user to gain access to sensitive information?
Man-in-the-middle attack
SQL injection attack
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Network Ethical Hacking Exercises are loading ...