Session hijacking Man-in-the-middle attack Dictionary attack Brute-force attack admin See author's posts Post navigation A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems. What is the best security policy concerning this setup? Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?