👤

All of the following actions can be helpful in thwarting session hijacking attacks except ________. Group of answer choices