ematthewsjr800 ematthewsjr800 25-04-2024 Computers and Technology contestada An attacker makes use of the Beacon implant on a target system to hijack a browser session. Which of the following best describes this attack?a) IE hijackingb) Man in the middlec) Man in the browserd) Man in the pivot