Which of the following BEST describes an attack where communications between two parties are intercepted and forwarded to each party with neither party being aware of the interception and potential modification to the communications?

A. Spear phishing
B. Main-in-the-middle
C. URL hijacking
D. Transitive access

Answer: B. Main-in-the-middle

Computer Science & Information Technology

You might also like to view...

What error will you get if you type a function name incorrectly?

A) #ERROR? B) #NAME? C) #VALUE? D) #FUNCTION?

Computer Science & Information Technology

________ is the process of dividing a worksheet window into two or four resizable panes so you can view separate parts of a worksheet at the same time

A) Tiling B) View Side by Side C) Splitting D) Synchronous Scrolling

Computer Science & Information Technology