In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
A. zombie-in-the-middle
B. sniff-in-the-middle
C. server-in-the-middle
D. man-in-the-middle
Answer: D
Computer Science & Information Technology
You might also like to view...
A multi-branch if statement directs program flow through exactly one of its branches.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____ software "zips" or reduces the size of a file using various techniques.
A. Reduction B. Compression C. Application D. Operating system
Computer Science & Information Technology