Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?
A. Spear phishing
B. Main-in-the-middle
C. URL hijacking
D. Transitive access
Answer: B. Main-in-the-middle
Computer Science & Information Technology
You might also like to view...
What error will you get if you type a function name incorrectly?
A) #ERROR? B) #NAME? C) #VALUE? D) #FUNCTION?
Computer Science & Information Technology
________ is the process of dividing a worksheet window into two or four resizable panes so you can view separate parts of a worksheet at the same time
A) Tiling B) View Side by Side C) Splitting D) Synchronous Scrolling
Computer Science & Information Technology